Cloud
See the latest white papers on how cloud computing and cloud services have transformed the IT industry, from data center services to virtualization, software-as-a-service, infrastructure-as-a-service, platform-as-a service and more.
-
Privacy for Shared System in Pcloud
Information Retrieval is the Process of obtaining materials, usually documents from unstructured huge volume of data. Several Protocols are available to retrieve bit information available in the distributed databases. A Cloud framework provides a platform for private information retrieval. In this paper, the authors combine the artifacts of the distributed...
Provided By Creative Commons
-
A New Approach for Providing the Data Security and Secure Data Transfer in Cloud Computing
Cloud computing is a emerging paradigm of computing in IT because of its performance, low cost, availability, accessibility, economy of scale, on-demand and other luxuries. Data is the most valuable of clients (or) company's asset; it must be protected with much vigilance than any other. Data Security in cloud is...
Provided By Creative Commons
-
Towards Achieving Secured and Decentralized Accountability in Cloud Computing
Cloud computing is an internet-based service where the users can acquire networked storage space and computer resources as per their demand. An underlined feature in cloud computing is that users' data are usually processed in a remote computer which they cannot access. This creates a fear of losing data in...
Provided By Creative Commons
-
Virtual Machine Migration Policies in Clouds
The Virtual Machine (VM) migration brings multiple benefits such as higher performance, improved manageability and fault tolerance. Failures are often common in systems comprising thousands of processors and often the authors encounter these failures using a well defined Fault Tolerance Mechanism (FTM).This technique is enabled using a Virtual Machine (VM)...
Provided By International Journal of Science and Research (IJSR)
-
Evaluating Cloud Service Vendors with Comparison
In this paper, the authors reviewed the technical and service aspects of different Cloud providers and presents the comparisons of these selected service offerings in cloud computing. By this User can have good understanding regarding services provided to avoid bottlenecks are also obstacles that could limit the growth. This comparison...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Implementation of Effective Third Party Auditing for Data Security in Cloud
Cloud computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. This unique paradigm brings about many new security challenges, which have not...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Surface Reconstruction Using Scattered Cloud Points
Surface reconstruction means that retrieve the data by scanning an object using a device such as laser scanner and construct it using the computer to gain back the soft copy of data on that particular object. Surface reconstruction is a reverse method. It is very useful when in a particular...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
An Optimistic Approach for Query Construction and Execution in Cloud Computing Environment
As the demand for cheaper commodity machines and large-scale databases rise, organizations have turned to cloud computing, or simply "The cloud," as the solution. Cloud data storage redefines the issues targeted on customer's out-sourced data (data that is not stored/retrieved from the customers own servers). In this paper, the authors...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Privacy - Preserving Audit of Secure Data Storage Services in Cloud Computing
Cloud computing is the delivery of computing as a service rather than a product. It provides shared resources, software, and information to computers and other devices over a network. The increasing network bandwidth and reliable yet flexible network connections make it even possible that users can now subscribe high quality...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
A Comparative Study of Different Deployment Models in a Cloud
Cloud computing is an emerging technology and organizations large and small are thinking about deploying their applications on the cloud. This paper aims at providing an overview of different types of cloud computing deployment models and which one to opt so that the security requirements and goals of the organization...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
A Defense Mechanism to Protect Cloud Comuputing Against Distributed Denial of Service Attacks
Cloud computing is an internet based pay as use service which provides three layered services (Software as a Service, Platform as a Service and Infrastructure as a Service) to its consumers on demand. These on demand service facilities provide to its consumers in multitenant environment but as facility increases complexity...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Cross-Breed Job Scheduling for Reducing the Server Load Using RBAC at Cloud
As the cloud computing is a new style of computing over internet. It has many advantages along with some crucial issues to be resolved in order to improve reliability of cloud environment. These issues are related with the load management, fault tolerance and different security issues in cloud environment. In...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Enhanced Security Architecture for Cloud Data Security
Cloud computing offers a prominent service for data storage known as cloud storage. The flow and storage of data on the cloud environment in plain text format may be main security threat. So, it is the responsibility of cloud service providers to ensure privacy and security of data on storage...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Online Multiplex Using Cloud Content Delivery Network
The online multiplex offers a Real Movie Theatre kind of experience online using cloud based content delivery networks and offers this technological platform to Regional movie makers to release their movies worldwide online in a theatre like atmosphere. It will be providing a cloud based platform for streaming high quality...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Performance Analysis of Cloud Computing under Non Homogeneous Conditions
Cloud computing is an evolutionary technology that differs from traditional parallel computing, distributed computing and grid computing as it provides solutions to many problems related to web based resource allocation by efficient and economical way of pay-per-use services. With tremendous increase in cloud services utilization, the allocation of resources to...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Exploring Cloud Computing and Identification of its Security Issues
Cloud computing is now a new emerging catchphrase which provide services to the customer over the internet. Now it is the future of the internet where users can pay according to usage. It is one of the productive grounds which are attracting many global investments. Cloud computing is providing a...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
A Database Watermarking Service with a Trusted Authority Architecture for Cloud Environment
Providing cloud services gets an increasing interest of both scientific and industrial applications today. Storage services are the fundamental component of the Cloud computing paradigm. Exploiting such storage services enables users to outsource their data into the cloud. Not only is the reduction of storage and maintenance costs achieved but...
Provided By Ain Shams University
-
A Security Approach for Data Migration in Cloud Computing
Cloud computing is a new paradigm that combines several computing concepts and technologies of the Internet creating a platform for more agile and cost-effective business applications and IT infrastructure. The adoption of Cloud computing has been increasing for some time and the maturity of the market is steadily growing. Security...
Provided By Institute of Electrical & Electronic Engineers
-
An Optimal Framework for Safe Data Transmission in Cloud Environment Without Disturbing IP Layer
In cloud computing, data storage and computing is carried out at data centers instead of personal computers. This technology is being used by every corporate and business for minimizing their expenses and increasing their profits but they are mainly worried for security of data. This paper helps in providing an...
Provided By Institute of Electrical & Electronic Engineers
-
A Novel Approach for Resource Discovery Using Random Projection on Cloud Computing Environments
Cloud computing offers different type's utilities to the IT industries. Generally the resources are scattered throughout the clouds. It has to enable the ability to find different resources are available at clouds, This again an important criteria of distributed systems. This paper investigates the problem of locating resources which is...
Provided By Engg Journals Publications
-
Practical System for Querying Encrypted Data on the Cloud
This paper proposes, compares and analyses query optimization techniques to securely query encrypted databases. Such querying capability is becoming increasingly relevant as individuals and enterprises move their data to the cloud. The schemes discussed delve into various design issues like speed, scalability and efficiency that are encountered in the context...
Provided By Engg Journals Publications
-
Levels of Security Issues in Cloud Computing
Now-a-days, cloud computing is booming in most of the IT industry. Most of the organizations are moving to cloud computing due to various reasons. It provide elastic architecture accessible through internet and also it eliminate the setting up of high cost computing infrastructure for the IT based solutions and services....
Provided By Engg Journals Publications
-
Secure Resource Management and Efficient Mining in Cloud Computing
Cloud computing provide a large scale computing resources to various customers and developers. The resource transformation between customers and cloud maintenance can be easily threatened by the various cyber attacks, because cloud computing provide the service to many customers who are not proven to be trustworthy. Therefore cloud computing system...
Provided By SCSSM
-
Database Audit Over Cloud Environment Using Forensic Analysis Algorithm
Cloud Computing is a technology that uses the internet and virtual remote servers to maintain data and applications. Cloud computing allows consumers and organizations to use applications without installation and access their personal files at anytime and anywhere through internet access. It provides people the way to share distributed resources...
Provided By Engg Journals Publications
-
Efficient Parallel Data Management Providing Load Balancing Service in Cloud Environment
Cloud is one of the rapidly developing technologies as it allows convergence of many new areas like scalability, rapid elasticity and broad network access in cloud services. This paper focuses on resource allocation for the parallel data processing, which also occupies a major issue in cloud computing. The current paper...
Provided By Engg Journals Publications
-
A Survey on Cloud Storage Systems and Encryption Schemes
Cloud computing is the collection of networked computers sharing the resources on-demand. The increasing use of cloud computing over the globe has brought into focus a need to design a secure cloud storage system. For safe and satisfactory implementation of the same, there is a need to place emphasis on...
Provided By Engg Journals Publications
-
A Survey on Keyword Based Search Over Outsourced Encrypted Data
Cloud Computing, the trendiest computing in information technology where everything is based on demand service and pay-for-use service. It is bringing of computing services such as SaaS, PaaS and IaaS over the internet that are supervised by arbitrator at outback locations. Many applications such as emails, file storage, business data,...
Provided By Engg Journals Publications
-
Secure Key Exchange for Cloud Environment Using Cellular Automata With Triple-DES and Error-Detection
The information housed on the cloud is often seen as valuable to individuals with malicious intent. There is a lot of personal information and potentially secure data that people store on their computers, and this information is now being transferred to the cloud. This makes it critical for the user...
Provided By Engg Journals Publications
-
A Survey on the Architectures of Data Security in Cloud Storage Infrastructure
Cloud computing is a most alluring technology that facilitates conducive, on-demand network access based on the requirement of users with nominal effort on management and interaction among cloud providers. The cloud storage serves as a dependable platform for long term storage needs which enables the users to move the data...
Provided By Engg Journals Publications
-
Efficient Resource Utilization Algorithm (ERUA) for Service Request Scheduling in Cloud
Cloud computing provides the user with the massive pool of resources in terms of pay-as-you-use policy. Cloud delivers these resources on demand through the use of network resources under different load conditions. As the users will be charged based on their usage the effective utilization of resources poses a major...
Provided By Engg Journals Publications
-
Comparison of Probabilistic Optimization Algorithms for Resource Scheduling in Cloud Computing Environment
Cloud Computing has significantly made its landmark in the field of information technology. A concept which initially stood nebulous is now used as a synonym for internet. It has paved a way to increase capacity as well as add capabilities on the fly without investing in new infrastructure, training new...
Provided By Engg Journals Publications
-
Efficient Parallel Data Processing in the Cloud
Cloud computing is a distributed computing technology which is the combination of hardware and software and delivered as a service to store, manage and process data. A new system is proposed to allocate resources dynamically for task scheduling and execution. Virtual machines are introduced in the proposed architecture for efficient...
Provided By Engg Journals Publications
-
Securing Cloud Computing Environment by Means of Intrusion Detection and Prevention System (IDPS)
Many IT industries have adopted the cloud based computing to provide vital services to others. Cloud Computing holds the potential to eliminate the requirements for setting up of high cost computing infrastructure for the IT-based solutions and services that the industry uses. So increasing number of network security related incidents...
Provided By IJCSMR
-
Impact of Security Techniques on Cloud Computing
Several trends are opening up the era of cloud computing, which is an Internet-based development and use of computer technology. The ever cheaper and more powerful processors, together with the Software as a Service computing architecture, are transforming data centers into pools of computing service on a huge scale. The...
Provided By IJCSMR
-
Cloud Vision Using MOCHA Architecture on Jelastic Cloud
Face recognition applications that automatically identify an individual from captured images or Videos are everywhere and are used for applications such as surveillance, airport security, military enforcement, and edge detection. Face recognition algorithms analyze images, extract information such as the shape, size and position of the facial features (e.g., eyes,...
Provided By International Journal of Engineering and Innovative Technology (IJEIT)
-
Design of Cloud Computing Based MIS Model for Textile Industries
Small and Medium Scale Textile Industries are working under intensive market pressure. This pressure forces the textile business to improve their Management Information System (MIS) and reduce expenses (Capex) in IT. IT technology are developing so fast, it is very difficult to keep update with IT by SME. In order...
Provided By International Journal of Engineering and Innovative Technology (IJEIT)
-
A Study on Task Scheduling Algorithms in Cloud Computing
Cloud computing is a new computing model using which applications, data and IT services are provided over the Internet. Cloud computing shares data and offers service transparently among its users. With the increase in number of users of cloud the tasks to be scheduled increases. The performance of cloud depends...
Provided By International Journal of Engineering and Innovative Technology (IJEIT)
-
Role of Component Based Systems in Data Mining & Cloud Computing
In this paper, the authors proposed a "Collaborative approach" which tells how component based systems are used with data mining as well as cloud computing. Data Mining helps for extracting potentially useful information from the raw data. The function of association rules are an important data mining technique used to...
Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)
-
Efficient Framework for Deploying Information in Virtual Datacenter with Cloud Security Application
The use of cloud computing has increased rapidly in many organizations. Cloud computing provides many benefits in terms of low cost and accessibility of data. In the Cloud Technology most organizations have own challenges when it comes to handle both critical and confidential information. The major challenge in cloud technology...
Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)
-
Optimization of Cost in Cloud Computing Using OCRP Algorithm
In cloud computing, cloud providers can offer cloud consumers two provisioning plans for computing resources, namely reservation and on-demand plans. Reservation plan is cheaper than that provisioned by on-demand plan, since cloud consumer has to pay to provider in advance. By using reservation plan, the consumer can reduce the total...
Provided By University College of Dublin
-
A Checklist for Cloud Computing Deals
Cloud computing has become a technology buzzword. Its definition is elusive, but a working definition could be: A service offered by vendors with large computer server networks to provide infrastructure such as processing capacity, storage for electronic data and records, software as a service or provision of services such as...
Provided By ALM Media Properties
-
Privacy and Security Risks With Cloud Computing Infrastructure (IaaS, SaaS)
Computing infrastructure management is often of huge cost in terms of both manual labor to support and maintain, as well as capital expenditures to continually purchase new machines and replacement parts. Virtualization technology allows administrators to leverage third-party resources in order to achieve similar infrastructure implementations for a fraction of...
Provided By uncompiled.com
-
Understanding Cloud Computing and Cloud-Based Security
Cloud computing enables the delivery of scalable and available capabilities by leveraging dynamic and on demand infrastructure. By leveraging these modern service technology advances and various pervasive Internet technologies, the "Cloud" represents an abstraction of services and resources, such that the underlying complexities of the technical implementations are encapsulated and...
Provided By SOA Systems
-
Cloud Computing Confusing?
References to Cloud Computing are everywhere today. There is a lot of debate about Cloud Computing, its place in business, where it is going, and how to use it. One thing is for certain, Cloud Computing is real. Cloud computing in many forms is transforming the technology landscape today. Another...
Provided By BeckITSystems
-
Building and Maintaining Effective Cloud Computing Infrastructures
Number of technical issues, including WAN performance, security, and central management of virtual and IP services prevent the widespread adoption of cloud computing infrastructures in the enterprise. This paper explores the nature of these technical challenges and offers solutions for building and maintaining more effective cloud computing infrastructures. Cloud computing...
Provided By CIRCADENCE
-
Cloud Computing, Telcos - Subscribers or Providers
Reading through many of the major computing press, it is difficult not to find oneself being drawn into the various discussions around Cloud Computing and how it's going to change the way the authors do business and how the authors address the Web. It's clearly got the interest of many...
Provided By Infotech Enterprises
-
Disruptive Innovation and Security Implications of Cloud Computing
The definition of cloud computing includes abstraction of infrastructure, resource democratization, services oriented, elasticity of use, and a utility model. Cloud computing is not one thing. It encompasses infrastructure, platform, and software as a service, each of which have multiple layers. A visual taxonomy of cloud computing is helpful in...
Provided By IANS
-
Cloud Computing?umm...err?what's That?
Apparently, cloud computing is the next evolution of how the authors will work over (or, within) the internet. "It's become 'The phrase of the day' and the authors are all talking about it," says the author. The author is echoing many of his peers. However, as the authors see every...
Provided By Elix-IRR
-
Demystifying the Cloud: Important Opportunities, Crucial Choices
The growing popularity of outsourced computing is no surprise. Together, with the now wide-availability of compact, commodity servers has fueled the demand for a wide range of cloud computing models. The promise? The ability to instantly acquire - and just as quickly dispose of - infrastructure elements needed to perform...
Provided By Global Netoptex
-
Semantic Technologies for Enterprise Cloud Management
Enterprise clouds apply the paradigm of cloud computing to enterprise IT infrastructures, with the goal of providing easy, flexible, and scalable access to both computing resources and IT services. Realizing the vision of the fully automated enterprise cloud involves addressing a range of technological challenges. This paper focus on the...
Provided By fluid Operations
-
Exploiting Cloud Computing to Meet the Changing Needs of Business
Cloud Computing is now matures enough to offer the commercial opportunities of Software as a Service to all software houses, not just the industry giants. Software as a Service brings the flexibility of pay-as-one-go pricing to the business software market. Reducing the entry cost allows a greater number of businesses...
Provided By Cloud Technology International
-
How to Make Money in Cloud Computing, the Next Hot Trend in IT
Information technology has dramatically changed the way people communicate and do business. Changes in Information Technology (IT) are rapidly taking place and investors who are able to spot the newest trends can profit from those trends greatly. One of the quickly evolving trends is cloud computing. Investors focused on IT...
Provided By Freeman Capital Management
-
Datacenter Hosting and Cloud Computing Services
Founded in 1995, Lore Systems operates an international datacenter network which today includes full service 3+ datacenter facilities located in the Washington DC, San Jose, and Brussels markets. Lore Systems provides one of the most reliable, most secure and most efficient datacenter and cloud computing services available worldwide to over...
Provided By Lore Systems
-
Enterprise Architecture and Cloud Computing
This Discussion Paper presents the response of the South African Chapter of the Association of Open Group Enterprise Architects (AOGEA SA) on the question "Does cloud computing make enterprise architecture irrelevant?" The conclusion is that this question is evidence of the misperception on the role of Enterprise Architecture (EA). As...
Provided By AOGEA
-
Evaluating Cloud Risk for the Enterprise: A Shared Assessments Guide
The growing adoption of cloud computing has created a pressing need for further analysis and investigation of the controls in distributed environments. Rather than fitting into contained silos protecting the so-called "Four walls" of the building, today's controls need to focus on all of the locations where data resides. One...
Provided By Shared Assessments
-
An Insight View of Kernel Visual Debugger in System Boot Up
For many years, developers could not figure out the mystery of OS kernels. The main source of this mystery is the interaction between operating systems and hardware while system's boot up and kernel initialization. In addition, many operating system kernels differ in their behavior toward many situations. For instance, kernels...
Provided By Maharishi University of Management
-
A Transaction Cost Theoretical Analysis of Software-as-a-Service (SAAS)-Based Sourcing in Smbs and Enterprises
This paper seeks to better understand the factors contributing to the adoption of Software as a Service (SaaS) as on-demand sourcing option. Grounded in Transaction Cost Theory (TCT), the authors developed a research model for assessing SaaS-sourcing at the application level. Four hypotheses with three TCT based constructs (application specificity,...
Provided By University of Mumbai
-
A Modular Failure-Aware Resource Allocation Architecture for Cloud Computing
The prevalence of cloud computing environments and the ever increasing reliance of large organisations on computational resources has meant that service providers must operate at unprecedented scales and levels of efficiency. Dynamic Resource Allocation (DRA) policies have been shown to allow service providers to improve resource utilisation and operational efficiency...
Provided By University of Warsaw
-
Towards Multi-Layer Autonomic Isolation of Cloud Computing and Networking Resources
Despite its many foreseen benefits, the main barrier to adoption of cloud computing remains security. Vulnerabilities introduced by virtualization of computing resources and unclear effectiveness of traditional security architectures in fully virtualized networks raise many security challenges. The most critical issue remains resource sharing in a multitenant environment, which creates...
Provided By Telecom SudParis
-
Review of Trust-Based File Sharing in Cloud Computing
The recent advances in cloud computing have risen a number of unforeseen security related issues in different aspects of cloud environments. Among these, the problem of guaranteeing secure access to computing resources in the cloud is gathering special attention. In this paper, the authors address open issues related to trust...
Provided By University of Brasilia
-
An Adaptive Trust Model for Software Services in Hybrid Cloud Environment
The objective of the research work is to propose an adaptive trust model applicable for software services deployed in cloud environment. In the earlier security modeling of cloud based applications, the trust among various services are evaluated either based on Bayesian or fuzzy approaches which are not formally verified before...
Provided By B.S.Abdur Rahman University
-
Cloud Computing's Software-as-a-Service (SaaS) Delivery Model Benefits Technical Courses in Higher Education
Software-as-a-Service (SaaS) is a form of cloud computing that relieves the user of the burden of hardware and software installation and management. SaaS can be used at the course level to enhance curricula and student experience. When cloud computing and SaaS are included in educational literature, the focus is typically...
Provided By Webster St.
-
An Architecture for Mobile Games with Cloud Computing Module
Applications for mobile devices are getting more and more sophisticated, including features as location based systems, image recognition and speech recognition, for example. Most of these applications use cloud computing to process these services. In order to use these features, this paper presents a novel architecture specially designed for mobile...
Provided By SBBooks, Inc.
-
CloudZone: Towards an Integrity Layer of Cloud Data Storage Based on Multi Agent System Architecture
The computing power in a cloud computing environments is supplied by a collection of data centers, or Cloud Data Storages (CDSs) housed in many different locations and interconnected by high speed networks. CDS, like any other emerging technology, is experiencing growing pains. Data integrity checking of data and data structures...
Provided By University Press
-
Ontological Services Level Agreement (SLA) Model and Its Application in Cloud Computing Environment
Service Level Agreement (SLA) is a contractual agreement that has been established between the members of Community of Practice (CoP) that consists of the service provider and the recipient for a specific application of services based on its allocating and sharing resources as services in cloud computing. This agreement is...
Provided By University Press
-
EVATM and the Cloud: An Integrated Approach to Modeling of Cloud Computing
Cloud Computing (CC) has been on the rise. Its pervasiveness has tremendous effects on both CC users and CC providers as well as on governments. The latter purports to regulate the industry to increase its security and users' confidence. Shannon's channel and \"Rational inattention\" may explain the remarkable rise of...
Provided By University Of Sheffield Students' Union
-
A Study on the Readiness of Cloud Computing for Captious Computations
The emergence cloud computing in the computing arena has had major effect in way the authors utilize computing resources. It is being heralded by many as the new computing paradigm, coming with disruptive technologies which are expected to foster all sorts of innovations. However, further investigations suggest that cloud computing...
Provided By Bapatla Engineering College
-
Quantum Attack Resistant Cloud
The emergence of cloud computing in the computing arena has had a major effect in a way the authors utilize computing resources. It is being heralded by many as the new computing paradigm, coming with disruptive technologies which are expected to foster all sorts of innovations. However, further investigations suggest...
Provided By Bapatla Engineering College
-
Study on Cloud Computing and Security Approaches
This paper highlights the basic concept of cloud computing and some of the security measures which have been taken into consideration till now. This paper also includes various ways which can be implemented for the betterment of cloud computing. With the recent advancement of technologies cloud computing has become a...
Provided By International Journal of Soft Computing and Engineering (IJSCE)
-
Efficient and Enhanced Algorithm in Cloud Computing
A class of systems and applications that procure distributed resources to execute the function in the decentralized manner is referred as cloud computing. It enables a wide range of users to access scalable, virtualized hardware, distributed and/or software infrastructure over the Internet. One of the challenging scheduling problems in Cloud...
Provided By International Journal of Soft Computing and Engineering (IJSCE)
-
Data Security in Cloud Based on Trusted Computing Environment
In recent years Cloud Computing has become one of the growing fields in computer science. In which the security problem of cloud computing has become a hot research topic. It must be verified in the trusted status of the platform which actually carries out the computing task in the cloud,...
Provided By International Journal of Soft Computing and Engineering (IJSCE)
-
To Improve Security in Cloud Computing With Intrusion Detection System Using Neural Network
Cloud computing is a new type of service which provides large scale computing resource to each customer. Cloud Computing Systems can be easily threatened by various cyber-attacks, because most of Cloud computing system needs to contain some Intrusion Detection Systems (IDS) for protecting each Virtual Machine (VM) against threats. In...
Provided By International Journal of Soft Computing and Engineering (IJSCE)
-
Data Migration Across the Clouds
Having an effective and efficient strategy for optimizing long distance data migration is essential for every data center. With the ever increasing demands for the IT needs of businesses it is also important for data centers to deliver data migration cost effectively especially when faced with the demands from remote...
Provided By International Journal of Soft Computing and Engineering (IJSCE)
-
Multi-Trust-OrBAC: Access Control Model for Multi-Organizational Critical Systems Migrated to the Cloud
Security of information systems is a problem chronic, the arrival of cloud computing as a new computing model, feeds the difficulty of implementing effective solutions. Thus more research is currently focused on data security in the cloud, and especially the issue of confidentiality. In this paper, the authors propose a...
Provided By International Journal of Soft Computing and Engineering (IJSCE)
-
Client and Data Confidentiality in Cloud Computing Using Fragmentation Method
In today's world cloud computing has occupied a prior place in the emerging technologies cause of its ease of access at lower costs. According Moore's Law computer technology, through transistors and integrated circuits, along with digital electronic devices, will double every 18 months to two years. It's a steep curve...
Provided By International Journal of Soft Computing and Engineering (IJSCE)
-
Ensuring User Security and Data Integrity in Multi-Cloud
The most common method used for user security is textual passwords. But they are vulnerable to eves dropping, dictionary attack, shoulder surfing etc. To address this problem, text can be combined with colors to generate session passwords called hybrid textual authentication for authentication in multi-cloud. Provable data possession is a...
Provided By International Journal of Soft Computing and Engineering (IJSCE)
-
QoS and Cost Aware Service Brokering Using Pattern Based Service Selection in Cloud Computing
In this paper an effective services selection mechanism has been introduced for creating a practically useful Service Broker. Selection of Services is based on characteristics such as performance, reliability and cost, ranking and integrity are also considered. In Cloud computing a service broker is responsible for routing the user requests...
Provided By International Journal of Soft Computing and Engineering (IJSCE)
-
Password Authentication Scheme Based on Shape and Text for Secure Sharing of PHR Using ABE in Cloud
Information Technology is widely used in health care for efficiently managing the Personal Health Records (PHR) in a cost effective manner. Under this scenario a computing paradigm (cloud computing) where the resources are provided as services will offer a ubiquitous access to medical data. However, there have been wide privacy...
Provided By International Journal of Soft Computing and Engineering (IJSCE)
-
SaaS Multi-Tenancy Isolation Testing-Challenges and Issues
Cloud computing is broadly categorized as Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). Multi-tenancy becomes an important feature of SaaS, designing and building of multi-tenancy aware applications introduces several new challenges, central one is tenant. A service provider can support multiple...
Provided By International Journal of Soft Computing and Engineering (IJSCE)
-
Access Control Protocol for Cloud Systems Based on the Model TOrBAC
The challenge that arises by the arrival of cloud computing is to carefully control the data that are no longer in possession of the company alone, but may be in the hands of Trusted Third Parties (TTP). Managing user trust is a major concern related to the management of migrated...
Provided By International Journal of Soft Computing and Engineering (IJSCE)