Volume 5, Issue 12, December 2017 International Journal of Advance Research in Computer Science and Management Studies
|
|
- Randall Lawson
- 5 years ago
- Views:
Transcription
1 ISSN: (Online) e-isjn: A Impact Factor: Volume 5, Issue 12, December 2017 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: Identifying Reputation Based Attacks in Trust Management Service of Cloud Armor Dr. Syed Shabbeer Ahmad Professor in CSED Muffkham Jah College of Engineering and Technology Hyderabad India Abstract: Trust management is one of the most challenging issues for the adoption and growth of cloud computing. We are providing a platform for that identifies Reputation based attacks through the Trust management service and accessing the trust of the services through feedbacks.to manage the availability of the decentralized implementation of the trust management service. For our extension work, we implemented parallel processing concept to improve the performance optimization of the system. Keywords: Attacks, Trust, Armor, Reputation, Sybil. I. INTRODUCTION Cloud computing offers dynamic, scalable, shared resources (e.g., computing power, storage, software) over the internet from remote data centers to the users (e.g., business organizations, government authorities, individuals). Trust Management is getting significance because of its immense importance in cloud environments. An effective trust management helps the cloud service consumers and providers to reap the benefits of the cloud computing technologies. Suppose a trust management service which uses reputation to establish trust between cloud service consumers and providers. Different cloud service providers who provide one or several cloud services including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS) or a combination of them are publicly available on the Internet. Cloud Armor is a framework for reputation based trust management in cloud environments, where Trust is delivered as a service (TaaS) where TMS spans distributed nodes to manage feedbacks in a decentralized way. The salient features are: Zero-Knowledge credibility proof protocol, Credibility model, Availability model. II. EXISTING SYSTEM The highly dynamic, distributed and non-transparent nature of cloud services makes the trust management in cloud environments a significant challenge. SLA is inadequate to establish trust between cloud consumers and providers. There are key issues of trust management are cloud environments. 1. Consumer s privacy. 2. Cloud services protection. 3. Trust management service s (TMS) availability. III. PROPOSED SYSTEM Cloud Armor, is a framework for reputation-based trust management in cloud environments. Cloud Armor exploits techniques to identify credible feedbacks from malicious ones. 2017, IJARCSMS All Rights Reserved 65 P a g e
2 Features of Cloud Armor are: 1. Zero Knowledge credibility proof protocol 2. Credibility model- helps in detecting misleading feedback from collusion and sybil attacks. 3. Availability model-proposed to spread several distributed nodes to manage feedbacks given by users in a decentralized way. 4. Performance optimization of system. IV. ARCHITECTURE V. FEEDBACK COLLUSION DETECTION 1. Feedback Density To support determination of credible trust feedbacks. To reduce value of the multiple feedbacks which are given from the same user is decided by feedback volume collusion factor. 2017, IJARCSMS All Rights Reserved ISSN: (Online) Impact Factor: e-isjn: A P a g e
3 2. Occasional Feedback Collusion Some attacks occur sporadically A sudden change in the feedback behavior indicates an occasional feedback collusion because the change of the number of trust feedbacks given, happen abruptly in a short period of time. Here we use time as a factor. VI. SYBIL ATTACKS DETECTION 1. Multi-Identity Recognition he main goal is to protect cloud services from users who use multiple identities to manipulate the trust results. We aim to identify similar credentials in identity records, given by malicious users. The frequency of a particular credential value is calculated as number of times of appearance that the credential value appears in the credential attribute normalized by total number of identity records. 2. Occasional Sybil Attacks The sudden changes in the total number of established identities indicates a possible occasional Sybil attack, wherein the established identities give feedbacks to service during a time period. VII. AVAILABILITY MODEL To maintain the availability of trust management service, we consider operational power to allow TMS nodes to share workload. Operational power factor compares the workload for a particular node with the average workload of all the nodes. Based on the operational power factor TMS uses the workload threshold to automatically adjust the number of nodes N tms that host the instances by creating extra instance to maintain desired workload for each node. VIII. TRUST RESULT CACHING If the trust management service instance receives a trust assessment request from a user it uses the trust result in the cache instead of computing the trust result. The trust management service instance will update the cache based on the number of new trust feedbacks (i.e., since the last update) given by a particular consumer and the number of new trust feedbacks given to a particular cloud service. 2017, IJARCSMS All Rights Reserved ISSN: (Online) Impact Factor: e-isjn: A P a g e
4 Dr. Syed et al., 1. Input :f feedbacks 2. Count 3. If ( ) TMS instance counts the total number of new trust feedbacks given to particular cloud service ( ) ( ) then /*TMS determines whether a recalculation is required for trust result related to a cloud service 4. Compute trust_result; 5. End if IX. ALGORITHM Algorithm manages the instances of nodes that handles the requests of users. 1. Initialization: tmsid(0) computes Op(stms) for all trust management service nodes if any 2. Generation: tmsid(0) estimates Ntms and generates additional trust management service nodes if required 3. Prediction: tmsid(0) predicts new availability of all trust management service nodes 4. Caching: tmsid(0) starts caching trust results (consumer side) and tmsid(s) start caching trust results (cloud service side) 5. Update the node instance table. 6. Check Workload 1: tmsid(0) checks whether ew(stms) is triggered by any tmsid(s) before reallocation if Op(stms) ew(stms) and V(stms) V(meantms) then go to next step else go to step 3 end if 7. Reallocation: tmsid(0) asks tmsid(s) which triggered ew(stms) to reallocate all trust feedbacks of the cloud service that has the lowest V(s) to another tmsid(s) that has the lowest V(stms) perform step 5 8. Check Workload 2: tmsid(0) computes Op(stms) for all trust management service nodes and checks whether ew(stms) is triggered for any tmsid(s) after reallocation if Op(stms) ew(stms) and V(stms) V(meantms) then go to step 2 Else go to step 3 end if. X. EXPERIMENTAL SETUP Hardware Requirements 1. Processor Pentium-IV 2.Speed -1.1Ghz 3.RAM -256MB(min) 4.Hard Disk- 20GB 5.Monitor SVGA Software Requirements 1. Operating System- Windows 10 2.Programming Language-Java. 2017, IJARCSMS All Rights Reserved ISSN: (Online) Impact Factor: e-isjn: A P a g e
5 XI. IMPLEMENTATION GUI of the System Node 1 instance is created 2017, IJARCSMS All Rights Reserved ISSN: (Online) Impact Factor: e-isjn: A P a g e
6 Collusion Attacks detection 2017, IJARCSMS All Rights Reserved ISSN: (Online) Impact Factor: e-isjn: A P a g e
7 Sybil attacks detection Using parallel processing, calculating Collusion attack 2017, IJARCSMS All Rights Reserved ISSN: (Online) Impact Factor: e-isjn: A P a g e
8 Trust values of services XII. RESULTS ANALYSIS TMS Trust before detection value Trust after detection value Cloud service Cloud service It shows the time difference taken between the normal execution and the parallel execution in nano seconds. It clearly depicts that our proposed solution for performance optimization of trust management service helps in processing of faster results. As parallel execution takes less time compared to normal execution. 2017, IJARCSMS All Rights Reserved ISSN: (Online) Impact Factor: e-isjn: A P a g e
9 XIII. CONCLUSION AND FUTURE WORK Cloud service users feedback is a good source to assess the overall trustworthiness of cloud services. Cloud consumers can discover, add feedbacks and assess the trust of cloud services. It help protect and detect malicious users to protect the integrity of the cloud service against collusion attacks and Sybil attacks.for Performance optimization of system, parallel processing is used to get faster results. For our future work, we can recommendation techniques which will evaluate the user s preference and recommend cloud services according to the user s history and background. References 1. Talal H. Noor, Quan Z. Sheng, Lina Yao, Schahram Dustdar and Anne H.H. Ngu, CloudArmor: Supporting Reputation-based Trust Management for Cloud Services, IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 2, pp , M. Wanga, G. Wangb, J. Tianb, H. Zhanga and Y. Zhanga. An Accurate and Multi-faceted Reputation Scheme for Cloud Computing, The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC-2014) Procedia Computer Science, 2014, vol. 34, pp R. Ko, P. Jagadpramana, M. Mowbray, S. Pearson, M. Kirchberg,L. Qianhui, and L. B. Sung, TrustCloud: A framework for accountability and trust in cloud computing, in Proc. IEEE World Congr. Services, 2011, pp I. Brandic, S. Dustdar, T. Anstett, D. Schumm, F. Leymann, and R.Konrad, Compliant cloud computing (C3): Architecture and language support for user-driven compliance management in clouds, in Proc. 3rd Int. Conf. Cloud Comput., 2010, pp S. Habib, S. Ries, and M. Muhlhauser, Towards a trust management system for cloud computing, in Proc. 10th Int. Conf. Trust,Security Privacy Comput. Commun., 2011, pp K. Hwang and D. Li, Trusted cloud computing with secure resources and data coloring, IEEE Internet Comput., vol. 14, no. 5,pp , Sep./Oct , IJARCSMS All Rights Reserved ISSN: (Online) Impact Factor: e-isjn: A P a g e
Cloud services using supporting reputation based trust management
Cloud services using supporting reputation based trust management E. Prathipa #1, N. Geetha *1 Mailam Engineering College, Mailam #1,*1 Prathielumalai23@gmail.com #1 Abstract - In cloud computing growth,
More informationEffective Handling of Credibility and Reputation- Based Trust Management for Cloud Services
Effective Handling of Credibility and Reputation- Based Trust Management for Cloud Services Ms.Shital Subhash Sangle ME in Computer Science and Engineering, Everest College of Engineering & Technology,
More informationCloud Services: A Platform for Credibility Based Trust Management in Cloud Environment
Cloud Services: A Platform for Credibility Based Trust Management in Cloud Environment P. Sowjanya, Ch. Dileep Chakravarthy M.Tech, Dept. of Information Technology, S.R.K.R Engineering College, Bimavaram,
More informationA Recommender System for Trust as a Service Layer in Cloud
A Recommender System for Trust as a Service Layer in Cloud E. GunaSekhar K. Madhavi M. Tech, Dept. of CSE Assoc. Professor, Dept. of CSE JNTUA College of Engineering Anantapur, Andhra Pradesh, India JNTUA
More informationREPUTATION BASED TRUST MANAGEMENT FOR CLOUD SERVICES T. Sandeep 1, G. Priya* 2
ISSN: 0975-766X CODEN: IJPTFI Available Online through Research Article www.ijptonline.com REPUTATION BASED TRUST MANAGEMENT FOR CLOUD SERVICES T. Sandeep 1, G. Priya* 2 1 PG Student, School of Computer
More informationCredibility-based Trust Management and Discovery of Cloud Services
Credibility-based Trust Management and Discovery of Cloud Services A dissertation submitted in fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science Talal Hashem Noor
More informationTHE highly dynamic, distributed, and non-transparent
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 27, NO. 2, FEBRUARY 2016 367 CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services Talal H. Noor, Quan Z. Sheng, Member,
More informationVolume 6, Issue 1, January 2018 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) e-isjn: A4372-3114 Impact Factor: 7.327 Volume 6, Issue 1, January 2018 International Journal of Advance Research in Computer Science and Management Studies Research Article /
More informationReputation Based Trust Model in Cloud Computing
Internet of Things and Cloud Computing 2017; 5(5-1): 5-12 http://www.sciencepublishinggroup.com/j/iotcc doi: 10.11648/j.iotcc.s.2017050501.12 ISSN: 2376-7715 (Print); ISSN: 2376-7731 (Online) Reputation
More informationANALYSIS OF MULTI APPLICATION SERVICE PROVIDER SELECTION FRAMEWORK USING SELCSP IN CLOUD ENVIRONMENT
ANALYSIS OF MULTI APPLICATION SERVICE PROVIDER SELECTION FRAMEWORK USING SELCSP IN CLOUD ENVIRONMENT B.NANDHINI Mr. O.K. GOWRISHANKAR, II-ME(CSE) Assistant Professor, Department of Computer Science and
More informationA Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
An Efficient Privacy-Preserving Ranked Keyword Search Method Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop
More informationInternational Journal of Advance Engineering and Research Development. AN Optimal Matrix Approach for virtual load allocation and data sharing
Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 02, February -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 AN
More informationA Comparative Study of Various Computing Environments-Cluster, Grid and Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1065
More informationEFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV)
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,
More informationABSTRACT I. INTRODUCTION
2018 IJSRSET Volume 4 Issue 4 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section : Engineering and Technology An Efficient Search Method over an Encrypted Cloud Data Dipeeka Radke, Nikita Hatwar,
More informationA Secure System for Evaluation and Management of Authentication, Trust and Reputation in Cloud-Integrated Sensor Networks
International Journal of Engineering and Technical Research (IJETR) A Secure System for Evaluation and Management of Authentication, Trust and Reputation in Cloud-Integrated Sensor Networks Ms. Arati Phadtare,
More informationABSTRACT I. INTRODUCTION
2018 IJSRSET Volume 4 Issue 2 Print ISSN: 2395-1990 Online ISSN : 2394-4099 National Conference on Advanced Research Trends in Information and Computing Technologies (NCARTICT-2018), Department of IT,
More informationEnhanced Cloud Armor: Using Privacy and Preservation Framework for ESMTP Server
Enhanced Cloud Armor: Using Privacy and Preservation Framework for ESMTP Server 1 A Muthuraja Boopathy, 2 B. Naveen kumar, 3 R. Udhayakumar and 4 P. Kalpana 1, 2, 3 Student, Dept. of CSE, Sri Krishna College
More informationThe Challenge of Cloud Security
The Challenge of Cloud Security Dr. Ray Klump Chair, Mathematics & Computer Science Director, MS in Information Security Lewis University Poll Question #1: What type of cloud service are you
More informationIn the past few years, cloud computing has
Editor: Schahram Dustdar dustdar@dsg.tuwien.ac.at Web-Scale Workflow Analysis of Web-Scale Cloud Services Talal H. Noor Taibah University Quan Z. Sheng University of Adelaide Anne H.H. Ngu Texas State
More informationISSN Vol.04,Issue.05, May-2016, Pages:
WWW.IJITECH.ORG ISSN 2321-8665 Vol.04,Issue.05, May-2016, Pages:0737-0741 Secure Cloud Storage using Decentralized Access Control with Anonymous Authentication C. S. KIRAN 1, C. SRINIVASA MURTHY 2 1 PG
More informationAuto Secured Text Monitor in Natural Scene Images
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 4, Ver. V (Jul.-Aug. 2016), PP 148-152 www.iosrjournals.org Auto Secured Text Monitor in Natural Scene
More informationCloud security is an evolving sub-domain of computer and. Cloud platform utilizes third-party data centers model. An
Abstract Cloud security is an evolving sub-domain of computer and network security. Cloud platform utilizes third-party data centers model. An example of cloud platform as a service (PaaS) is Heroku. In
More informationSEGMENT STATURE HASH TABLE BASED COST EFFICIENT DATA SHARING IN CLOUD ENVIRONMENT
SEGMENT STATURE HASH TABLE BASED COST EFFICIENT DATA SHARING IN CLOUD ENVIRONMENT K. Karthika Lekshmi 1, Dr. M. Vigilsonprem 2 1 Assistant Professor, Department of Information Technology, Cape Institute
More informationResults and Discussions on Transaction Splitting Technique for Mining Differential Private Frequent Itemsets
Results and Discussions on Transaction Splitting Technique for Mining Differential Private Frequent Itemsets Sheetal K. Labade Computer Engineering Dept., JSCOE, Hadapsar Pune, India Srinivasa Narasimha
More informationA Two-Fold Authentication Mechanism for Network Security
Asian Journal of Engineering and Applied Technology ISSN 2249-068X Vol. 7 No. 2, 2018, pp. 86-90 The Research Publication, www.trp.org.in A Two-Fold for Network Security D. Selvamani 1 and V Selvi 2 1
More informationVolume 6, Issue 12, December 2018 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) e-isjn: A4372-3114 Impact Factor: 7.327 Volume 6, Issue 12, December 2018 International Journal of Advance Research in Computer Science and Management Studies Research Article
More informationInternational Journal of Advance Engineering and Research Development. A Private Cloud On Open Source Paradigm
Impact Factor: 4.14 (Calculated by SJIF-2015) e- ISSN: 2348-4470 p- ISSN: 2348-6406 International Journal of Advance Engineering and Research Development Volume 3, Issue 4, April -2016 A Private Cloud
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017
RESEARCH ARTICLE OPEN ACCESS Optimizing Fully Homomorphic Encryption Algorithm using Greedy Approach in Cloud Computing Kirandeep Kaur [1], Jyotsna Sengupta [2] Department of Computer Science Punjabi University,
More informationTABLE OF CONTENTS CHAPTER TITLE PAGE NO NO.
vi TABLE OF CONTENTS CHAPTER TITLE PAGE NO NO. ABSTRACT iii LIST OF TABLES xiii LIST OF FIGURES xiv LIST OF SYMBOLS AND ABBREVIATIONS xix 1 INTRODUCTION 1 1.1 CLOUD COMPUTING 1 1.1.1 Introduction to Cloud
More informationData Mining for XML Query-Answering Support
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 5, Issue 6 (Sep-Oct. 2012), PP 25-29 Data Mining for XML Query-Answering Support KC. Ravi Kumar 1, E. Krishnaveni
More informationJAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing
JAVA IEEE TRANSACTION ON CLOUD COMPUTING 1. ITJCC01 Nebula: Distributed Edge for Data Intensive Computing 2. ITJCC02 A semi-automatic and trustworthy scheme for continuous cloud service certification 3.
More informationThe Software Driven Datacenter
The Software Driven Datacenter Three Major Trends are Driving the Evolution of the Datacenter Hardware Costs Innovation in CPU and Memory. 10000 10 µm CPU process technologies $100 DRAM $/GB 1000 1 µm
More informationISSN: (Online) Volume 4, Issue 1, January 2016 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 4, Issue 1, January 2016 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationFundamental Concepts and Models
Fundamental Concepts and Models 1 Contents 1. Roles and Boundaries 2. Cloud Delivery Models 3. Cloud Deployment Models 2 1. Roles and Boundaries Could provider The organization that provides the cloud
More informationMULTIPARTY ACCESS CONTROL FOR ONLINE SOCIAL NETWORKS: MODEL AND MECHANISMS
MULTIPARTY ACCESS CONTROL FOR ONLINE SOCIAL NETWORKS: MODEL AND MECHANISMS ABSTRACT Online social networks (OSNs) have experienced tremendous growth in recent years and become a de facto portal for hundreds
More informationConstruction Scheme for Cloud Platform of NSFC Information System
, pp.200-204 http://dx.doi.org/10.14257/astl.2016.138.40 Construction Scheme for Cloud Platform of NSFC Information System Jianjun Li 1, Jin Wang 1, Yuhui Zheng 2 1 Information Center, National Natural
More informationInternational Journal of Computer & Organization Trends Volume5 Issue3 May to June 2015
Performance Analysis of Various Guest Operating Systems on Ubuntu 14.04 Prof. (Dr.) Viabhakar Pathak 1, Pramod Kumar Ram 2 1 Computer Science and Engineering, Arya College of Engineering, Jaipur, India.
More informationKusum Lata, Sugandha Sharma
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 4 ISSN : 2456-3307 A Survey on Cloud Computing and Mobile Cloud Computing
More informationR. R. Badre Associate Professor Department of Computer Engineering MIT Academy of Engineering, Pune, Maharashtra, India
Volume 7, Issue 4, April 2017 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Service Ranking
More informationPolicy for Resource Allocation in Cloud Computing
American Journal of Intelligent Systems 2017, 7(3): 95-99 DOI: 10.5923/j.ajis.20170703.12 Policy for Resource Allocation in Cloud Computing Amitha B. *, Shreenath Acharya Department of Computer Science,
More informationManaging SaaS risks for cloud customers
Managing SaaS risks for cloud customers Information Security Summit 2016 September 13, 2016 Ronald Tse Founder & CEO, Ribose For every IaaS/PaaS, there are 100s of SaaS PROBLEM SaaS spending is almost
More informationASSESSING INVARIANT MINING TECHNIQUES FOR CLOUD-BASED UTILITY COMPUTING SYSTEMS
ASSESSING INVARIANT MINING TECHNIQUES FOR CLOUD-BASED UTILITY COMPUTING SYSTEMS ABSTRACT Likely system invariants model properties that hold in operating conditions of a computing system. Invariants may
More informationSurvey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationIBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan
IBM Cloud Security for the Cloud Amr Ismail Security Solutions Sales Leader Middle East & Pakistan Today s Drivers for Cloud Adoption ELASTIC LOWER COST SOLVES SKILLS SHORTAGE RAPID INNOVATION GREATER
More informationVolume 2, Issue 11, November 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 11, November 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
More informationStar: Sla-Aware Autonomic Management of Cloud Resources
Star: Sla-Aware Autonomic Management of Cloud Resources Sakshi Patil 1, Meghana N Rathod 2, S. A Madival 3, Vivekanand M Bonal 4 1, 2 Fourth Sem M. Tech Appa Institute of Engineering and Technology Karnataka,
More informationOverview of Challenges in VANET
Overview of Challenges in VANET Er.Gurpreet Singh Department of Computer Science, Baba Farid College, Bathinda(Punjab), India ABSTRACT VANET are becoming active area of research and development because
More informationVolume 6, Issue 4, April 2018 International Journal of Advance Research in Computer Science and Management Studies I. INTRODUCTION
ISSN: 2321-7782 (Online) e-isjn: A4372-3114 Impact Factor: 7.327 Volume 6, Issue 4, April 2018 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey
More informationHigh Performance Computing on MapReduce Programming Framework
International Journal of Private Cloud Computing Environment and Management Vol. 2, No. 1, (2015), pp. 27-32 http://dx.doi.org/10.21742/ijpccem.2015.2.1.04 High Performance Computing on MapReduce Programming
More informationMulti Packed Security Addressing Challenges in Cloud Computing
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationCentral Controller Framework for Mobile Cloud Computing
, pp.233-240 http://dx.doi.org/10.14257/ijgdc.2016.9.4.21 Central Controller Framework for Mobile Cloud Computing Debabrata Sarddar 1, Priyajit Sen 2 and Manas Kumar Sanyal 3 * 1 Assistant professor, Department
More informationADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT
ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT PhD Summary DOCTORATE OF PHILOSOPHY IN COMPUTER SCIENCE & ENGINEERING By Sandip Kumar Goyal (09-PhD-052) Under the Supervision
More informationDATA INTEGRITY TECHNIQUES IN CLOUD: AN ANALYSIS
DATA INTEGRITY TECHNIQUES IN CLOUD: AN ANALYSIS 1 MS. R. K. PANDYA, 2 PROF. K. K. SUTARIA 1 M.E.[Cloud Computing] Student, Computer Engineering Department, V. V. P. Engineering College, Rajkot, Gujarat
More information2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,
2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising
More informationENERGY EFFICIENT VIRTUAL MACHINE INTEGRATION IN CLOUD COMPUTING
ENERGY EFFICIENT VIRTUAL MACHINE INTEGRATION IN CLOUD COMPUTING Mrs. Shweta Agarwal Assistant Professor, Dept. of MCA St. Aloysius Institute of Technology, Jabalpur(India) ABSTRACT In the present study,
More informationRobust Reputation Based Trust Management Framework for Federated-Cloud Environments
Robust Reputation Based Trust Management Framework for Federated-Cloud Environments M.N. Derahman, A. Abdullah and M. F. Azmi Faculty of Computer Science and Information Technology University Putra Malaysia.
More informationCLOUD COMPUTING & ITS LOAD BALANCING SCENARIO
CLOUD COMPUTING & ITS LOAD BALANCING SCENARIO Dr. Naveen Kr. Sharma 1, Mr. Sanjay Purohit 2 and Ms. Shivani Singh 3 1,2 MCA, IIMT College of Engineering, Gr. Noida 3 MCA, GIIT, Gr. Noida Abstract- The
More informationISSN: (Online) Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com
More informationSecure Token Based Storage System to Preserve the Sensitive Data Using Proxy Re-Encryption Technique
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
More informationOptimization of Multi-server Configuration for Profit Maximization using M/M/m Queuing Model
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-2, Issue-8 E-ISSN: 2347-2693 Optimization of Multi-server Configuration for Profit Maximization using M/M/m
More informationEnhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms
Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms A.Sarika*1, Smt.J.Raghaveni*2 M.Tech Student, Dept of CSE, S.R.K.R Engineering college, Bhimavaram, AP,
More informationFine-Grained Data Updates on Cloud with Authorized Public Auditing
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 03, 2015 ISSN (online): 2321-0613 Fine-Grained Data Updates on Cloud with Authorized Public Auditing Sindhu L 1 Ms Leelavathi
More informationA Brief Comparison of Security Patterns for Peer to Peer Systems
A Brief Comparison of Security Patterns for Peer to Peer Systems Rahul J. Vaghela 1, Kalpesh Patel 2 1 PG Student, Department of Computer Engineering, L.D. College Of Engineering, Gujarat Technological
More informationA Retrieval Mechanism for Multi-versioned Digital Collection Using TAG
A Retrieval Mechanism for Multi-versioned Digital Collection Using Dr M Thangaraj #1, V Gayathri *2 # Associate Professor, Department of Computer Science, Madurai Kamaraj University, Madurai, TN, India
More informationUser Task Automator. Himanshu Prasad 1, P. Geetha Priya 2, S.Manjunatha 3, B.H Namratha 4 and Rekha B. Venkatapur 5 1,2,3&4
Asian Journal of Engineering and Applied Technology ISSN: 2249-068X Vol. 6 No. 1, 2017, pp.40-44 The Research Publication, www.trp.org.in Himanshu Prasad 1, P. Geetha Priya 2, S.Manjunatha 3, B.H Namratha
More informationBuilding a Secure and Compliant Cloud Infrastructure. Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc.
Building a Secure and Compliant Cloud Infrastructure Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc. Why Are We Here? Expanded Enterprise Data access anywhere, anytime
More informationENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING
ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING S KEERTHI 1*, MADHAVA REDDY A 2* 1. II.M.Tech, Dept of CSE, AM Reddy Memorial College of Engineering & Technology, Petlurivaripalem. 2. Assoc.
More informationNovel Hybrid k-d-apriori Algorithm for Web Usage Mining
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 4, Ver. VI (Jul.-Aug. 2016), PP 01-10 www.iosrjournals.org Novel Hybrid k-d-apriori Algorithm for Web
More informationA Comparative Performance Analysis of Load Balancing Policies in Cloud Computing Using Cloud Analyst
A Comparative Performance Analysis of Load Balancing Policies in Cloud Computing Using Cloud Analyst Saurabh Shukla 1, Dr. Deepak Arora 2 P.G. Student, Department of Computer Science & Engineering, Amity
More informationPart III: Evaluating the Business Value of the Hybrid Cloud
Contents at a Glance Introduction... 1 Part I: Understanding Concepts and Construction... 7 Chapter 1: Discovering the Fundamentals of Your Computing Environment...9 Chapter 2: The Hybrid Cloud Continuum...25
More informationDefenses against Large Scale Online Password Guessing by Using Persuasive Cued Click Points
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 4, April 2013,
More informationSpatial, Transform and Fractional Domain Digital Image Watermarking Techniques
Spatial, Transform and Fractional Domain Digital Image Watermarking Techniques Dr.Harpal Singh Professor, Chandigarh Engineering College, Landran, Mohali, Punjab, Pin code 140307, India Puneet Mehta Faculty,
More informationDOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE
DOTNET Projects I. DOTNET based CLOUD COMPUTING 1. Enabling Cloud Storage Auditing with VerifiableOutsourcing of Key Updates (IEEE 2. Conjunctive Keyword Search with Designated Tester and Timing Enabled
More informationSocial Networks: Service Selection and Recommendation
Social Networks: Service Selection and Recommendation Jebrin Al-Sharawneh Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Information Systems) Faculty of Engineering
More informationJAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing
JAVA IEEE TRANSACTION ON CLOUD COMPUTING 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing 2. ITJCC02 A semi-automatic and trustworthy scheme for continuous cloud service certification
More informationDATA SECURITY IN CLOUDS USING DECENTRALIZED ACCESS CONTROL, ANONYMOUS AUTHENTICATION AND RSA BASED ENCRYPTION
DATA SECURITY IN CLOUDS USING DECENTRALIZED ACCESS CONTROL, ANONYMOUS AUTHENTICATION AND RSA BASED ENCRYPTION 1 VARALATCHOUMY.M, 2 PRATEEK. S. BHARADWAJ, 3 R. ROHITH, 4 NAGACHANDRA. K. P, 5 PRAVEEN. M
More informationSensor Deployment Algorithm for Hole Detection and Healing By Using Local Healing
Sensor Deployment Algorithm for Hole Detection and Healing By Using Local Healing Rini Baby N M.G University, Kottayam, Kerala, India Abstract: The main services provided by a WSN (wireless sensor network)
More informationConcept of Trusted Transaction for Secure Cloud Transactions
Governors State University OPUS Open Portal to University Scholarship All Capstone Projects Student Capstone Projects Spring 2016 Concept of Trusted Transaction for Secure Cloud Transactions Taufeeq Mohammed
More informationISSN: (Online) Volume 2, Issue 10, October 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 10, October 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationDecentralized Access Control with Anonymous Authentication of Data Stored in Clouds
Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds K.Shravan Naidu Department of Computer Science and Engineering Vignana Bharathi Institute of Technology, Aushapur, Ghatkesar,
More informationCloud Computing Security: From Single to Multi-Clouds
2012 45th Hawaii International Conference on System Sciences Cloud Computing Security: From Single to Multi-Clouds Abstract: The use of cloud computing has increased rapidly in many organizations. Cloud
More informationCES: A FRAMEWORK FOR EFFICIENT INFRASTRUCTURE UTILIZATION THROUGH CLOUD ELASTICITY AS A SERVICE (CES)
International Journal of Computer Engineering & Technology (IJCET) Volume 6, Issue 8, Aug 2015, pp. 24-30, Article ID: IJCET_06_08_004 Available online at http://www.iaeme.com/ijcet/issues.asp?jtypeijcet&vtype=6&itype=8
More informationOnline Optimization of VM Deployment in IaaS Cloud
Online Optimization of VM Deployment in IaaS Cloud Pei Fan, Zhenbang Chen, Ji Wang School of Computer Science National University of Defense Technology Changsha, 4173, P.R.China {peifan,zbchen}@nudt.edu.cn,
More informationLoad Balancing Algorithms in Cloud Computing: A Comparative Study
Load Balancing Algorithms in Cloud Computing: A Comparative Study T. Deepa Dr. Dhanaraj Cheelu Ravindra College of Engineering for Women G. Pullaiah College of Engineering and Technology Kurnool Kurnool
More informationDistributed File Storage and Sharing using P2P Network in Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,
More informationA Supervised Method for Multi-keyword Web Crawling on Web Forums
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
More informationSecuring Your Cloud Introduction Presentation
Securing Your Cloud Introduction Presentation Slides originally created by IBM Partial deck derived by Continental Resources, Inc. (ConRes) Security Division Revision March 17, 2017 1 IBM Security Today
More informationAngela McKay Director, Government Security Policy and Strategy Microsoft
Angela McKay Director, Government Security Policy and Strategy Microsoft Demographic Trends: Internet Users in 2005.ru.ca.is.uk.nl.be.no.de.pl.ua.us.fr.es.ch.it.eg.il.sa.jo.tr.qa.ae.kz.cn.tw.kr.jp.mx.co.br.pk.th.ph.ng.in.sg.my.ar.id.au
More informationVolume 8, No. 3, March April 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at
Volume 8, No. 3, March April 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No. 0976-5697 Design of Architecture for Efficient
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK DISTRIBUTED FRAMEWORK FOR DATA MINING AS A SERVICE ON PRIVATE CLOUD RUCHA V. JAMNEKAR
More informationDouble Threshold Based Load Balancing Approach by Using VM Migration for the Cloud Computing Environment
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 1 January 2015, Page No. 9966-9970 Double Threshold Based Load Balancing Approach by Using VM Migration
More informationProgramowanie w chmurze na platformie Java EE Wykład 1 - dr inż. Piotr Zając
Programowanie w chmurze na platformie Java EE Wykład 1 - dr inż. Piotr Zając Cloud computing definition Cloud computing is a model for enabling ubiquitous, convenient, ondemand network access to a shared
More informationDetecting Spam Zombies By Monitoring Outgoing Messages
International Refereed Journal of Engineering and Science (IRJES) ISSN (Online) 2319-183X, (Print) 2319-1821 Volume 5, Issue 5 (May 2016), PP.71-75 Detecting Spam Zombies By Monitoring Outgoing Messages
More informationThe Business of Security in the Cloud
The Business of Security in the Cloud Dr. Pamela Fusco Vice President Industry Solutions Solutionary Inc. CISSP, CISM, CHSIII, IAM, NSA/CSS Adjunct Faculty Promises Promises The promise of cloud computing
More informationInternational Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationInternational Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 10, October 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationGovernment Data Center Modernization
Government Data Center Modernization Service Standards Focus Group Discussion 13 March 2017 Table of Contents Welcome and Introduction What are standards and their need Key challenges Standard functional
More informationHow do you decide what s best for you?
How do you decide what s best for you? Experience Transparency Leadership Commitment Cost reduction Security Trustworthiness Credibility Confidence Reliability Compliance Privacy Expertise Flexibility
More informationTrust < Cloud < Trust
Trust < Cloud < Trust Martin Vliem National Security Officer CCSP, CISSP, CISA martin.vliem@microsoft.com https://www.linkedin.com/in/mvliem Digital Transformation expectations? "The Americans have need
More information