Volume-10 (National Conference on Recent Trends in Computer Science and Information Technology)
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Cloud Computing Threats & Their Impact |
Country | : | India |
Authors | : | Sabah Naseem || Prof. A B Sasankar |
Abstract: We know that now a days the cloud computing is growing more fastly. It is aadvance technology. Where data, hardware & software are shared over a network on use & pay rule. Because of this many organization are moving towards the cloud. There is no. of threats which cause possible harm or used to exploit important data. A threat can be either intentional or accidental. In this paper we will discuss about the threat & security issues. What are the different type of threats & their impact.
Keywords -cloud computing , cloud computing service model, threats.
[1]. MervatAdibBamiah* et al. / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 9, Issue No. 1, 087 – 090
[2]. Che Wan AmiruddinChek Wan Samsudin,Data Provenance for e-Social Science Cloud Applications
[3]. Albert Folch, Interface development for Eucalyptus based cloud
[4]. http://searchcloudcomputing.techtarget.com/definition/hybrid-cloud
[5]. http://talkcloudcomputing.com/wp-content/uploads/2012/10/Cloud-Computing-2-Web-1.jpg
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Cloud Computing Security Disputes, Defies and Elucidations |
Country | : | India |
Authors | : | Venugopal S. Narsingoju || Dr. S. B. Kishor |
Abstract: Cloud computing is an up going technology now a days where shared resources, software's and information are provided to computers and devices. Security in respect to cloud computing is an important and critical aspect, and has numerous issues and problem related to it. Since cloud computing uses distributed resources in open environment, thus it is important to provide the security and trust to share the data for developing cloud computing applications......
Keywords: Cloud Computing, Risk Utility Commuting, Virtual Machine Layer
[1]. Buyya R, Chee Shin Y, Venugopal S, Broberg J, Brandic I. Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems; 2009; 25(6):599–616.
[2]. Armbrust M, Fox A, Griffith R, Joseph A D, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M. A View of Cloud Computing. Communications of the ACM ; 2010; 53(4):50–58.
[3]. Subashini S, Kavitha V. A survey on security issues in service delivery models of cloud computing. Journal of Network and mputer Applications; 2011; 4(1):1–11.
[4]. Takabi H, Joshi J B D, Ahn G. Security a nd privacy challenges in cloud computing environments. IEEE Security & Privacy;2010;8(6) :24–31.
[5]. Sangroya A, Kumar S, Dhok J, Varma V. Towards analyzing data security risks in cloud computing environments. Communications in Computer and Information Science; 2010; 54 :255–265.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | WEB PERSONALIZATION BASED ON ROCK ALGORITHM |
Country | : | India |
Authors | : | Ms. Bhagyashree Ambulkar || Ms. Rajeshree Ambulkar || Mr. Praful Barekar |
Abstract: With the demand of different information by different users from same web page becomes critical problem for web personalization. The motive of clustering analysis is to discover rich quality of clusters such that the similarity between the intra-cluster is high. By usingpersonalization,access to the web pages or the contents of a Web page are modified to better fit the needs of the user.....
Keywords: web usage mining, web personalization, hierarchical agglomerative algorithm.
[1] Sudipto Guha , Rajeev Rastogi , Kyuseok Shim "ROCK: A Robust Clustering Algorithm for Categorical Attributes".
[2] Amit Rustagi "A Near Real-Time Personalization for eCommerce".
[3] http://dev.day.com/docs/en/cq/5-5/administering/ personalization.html
[4] Dimitrios Pierrakos, Georgios paliouras, Christos Papatheodorou and Constantine D. Spyropoulos "Web Usage Mining as a Tool for Personalization: A Survey" User Modeling and User-Adapted Interaction 13: 311-372,2 003.
[5] Lu Mei, Zhao Xiang-Jun "A Novel PSO k-Modes Algorithm for Clustering Categorical Data".
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Interference issues of WLAN 802.11b with Other Devices in ISM 2.4 Ghz Band. |
Country | : | India |
Authors | : | Anupam chaube |
Abstract: The paper presented deals with the issues of interference in ISM 2.4 Ghz band when WLAN 802.11b operating with other devices specially cordless phone and BT operated WPAN. From observation it is clear that WLAN 802.11b receive severe interference from both these devices because their power level coincide with each other, we have also observe that interference caused by BT will be more severe when it is in close proximity of WLAN. The interference issue becomes more serious when WLAN and WPAN are implemented on a single chip designed to share some radio components......
........
[1]. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE std 802.11, 1999.
[2]. Bluetooth Revealed – Brent A. Miller,Chatschik Bisdikian. Pearson Education.
[3]. B. P. Crow, I.Widjaja, J. G. Kim, and P. T. Sakai, ―IEEE 802.11 wireless local area networks,‖ IEEE Commun. Mag., vol. 35, pp.
116–126, Sept. 1997.
[4]. Bluetooth Core Specification [Online]. Available: http://www.bluetooth. Com
[5]. WiFi (802.11b) and Bluetooth: An Examination of Coexistence Approaches (2001, Mar.). [Online].
Available:http://www.mobilian.com/ whitepaper_frame.htm
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | VARIOUS SECURITY ISSUES IN CLIENT SIDE CLOUD COMPUTING |
Country | : | India |
Authors | : | Ms. Punam R. Naphade || Dr. Girish Katkar |
Abstract: Cloud Computing (CC) is an emerging computing paradigm that provides large amount of computing and storage to the Clients provisioned as a service over the internet in a pay-as you-go pricing model, where the Clients pay only according to the usage of their services. In Cloud Computing, the feature of multi-tenancy gives privacy, security, access control, authentication, authorization challenges, because of sharing of physical resources among un-trusted tenants so, a suitable technique with proper management should be applied before outsourcing the data and updating of data........
Keywords:- IaaS, PaaS, Saas, Vulnerability, Sustainable, OAuth, SAML etc.
[1]. Wolf Halton, "Security Solutions for Cloud Computing" July 15, 2010.
[2]. Henry J. Sienkiewicz, "Cloud Computing: A perspective" Defense Information Systems Agency - April 2009.
[3]. Privacy in the Cloud Computing Era: A Microsoft Perspective - November 2009.
[4]. Bharat Bhargava, Anya Kim, YounSun Cho, "Research in Cloud Security and Privacy" .
[5]. Ponemon Institute and CA "Security of cloud computing Users: A study of Practitioners in the US & Europe". May 12, 2010.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Resolving the Optimization Problems Of Multi Communication Gateway for Remote Embedded Web Server using PSO |
Country | : | India |
Authors | : | Prof. Nitin S. Raulwar || Dr. Pradeep B. Dahikar |
Abstract: Wireless sensor networks (WSNs) are networks of autonomous nodes used for monitoring an environment. Developers of WSNs face challenges that arise from communication link failures, memory and computational constraints, and limited energy. Many issues in WSNs are formulated as multidimensional optimization problems, and approached through bio-inspired techniques. Particle swarm optimization (PSO) is a simple, effective and computationally efficient optimization algorithm.........
Keywords: clustering, data-aggregation , embedded web server, , RSA, Optimal coverage problem, PSO, Wireless sensor networks.
[1]. D. Raskovic Electr. & Comput. Eng. Dept., Univ. of Alaska Fairbanks, Fairbanks, AK V. Revuri ; D. Giessel ; A. Milenkovic Embedded web server for wireless sensor networks System Theory, 2009. SSST 2009. 41st Southeastern Symposium on
[2]. Satyobroto Talukder, ―Mathematical Modelling and Applications of Particle Swarm Optimization‖, Feb 2011.
[3]. R.Karthi, S.Arumugam, and K. Rameshkumar. (2008, Jan.). Comparative evaluation of Particle Swarm Optimization Algorithms for Data Clustering using real world data sets. IJCSNS International Journal of Computer Science and Network Security.[Online].8(1).pp. 203-212.
[4]. Jianchao Fan,, Jun Wang, and Min Han, ―Cooperative Coevolution for Large-scale Optimization Based on Kernel Fuzzy Clustering and Variable Trust Region Methods,‖. IEEE Transactions on TFS., to be published.
[5]. Qinghai Bai, ―Analysis of Particle Swarm Optimization Algorithm‖, Computer and Information Science, www.ccsenet.org/cis,Vol. 3, No. 1, February 2010, pp. 1-5.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Roadmap towards Cloud Migration |
Country | : | India |
Authors | : | Mr. Ashish D. Musale || Dr. Pradeep G. Khot |
Abstract: Most organizations still run a large majority of their IT applications, services and workloads within their own on premises data centers. This gives significant scope to realize potential operational and efficiency improvements achievable by cloud migrating some or more of those processes into external, off-premises managed hosting or cloud service environments.........
Keywords: Application, cloud computing, cloud migration, clo ud types, Service providers
[1]. Boutaba, Qi Zhang · Lu Cheng · Raouf. "Cloud computing: state-of-the-art and research challenges." J Internet Serv Appl (2010) (April 2010).
[2]. kailashjayaswal, jagannathkallakurchi, donald j. Houde, dr. Deven shah, kogent learning solutions,. cloud computing black book,dream tech press. n.d.
[3]. michaeldaconta,"the great cloud migration: your roadmap to cloud computing, big data and linked data. n.d.
[4]. Varia, Jinesh. "Migrating your Existing Applications to the AWS Cloud." October 2010.
[5]. http://cloudtweaks.com/2013/10/plan-ahead-for-a-successful-cloud-migration/
[6]. http://tier3technology.com/cloud-migration.php
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Study Of Energy And Time Optimization Using Green Computing In Cloud Environment |
Country | : | India |
Authors | : | Shubhangi Gadhwe |
Abstract: Cloud computing is widely used in business and IT companies. It allows to host the application from consumers, scientists and various domains on payments basis. However data centres hosting cloud computing applications consume huge amounts of energy, contributing to high operational costs and evolution of carbon to the environment. The data centres or clouds have high capacity of data storage and processing. As per the features provided it requires huge amount of power supply and resources..........
Keywords: Cloud Computing, Green Computing, Virtualization, Energy Efficiency, Resource Management
[1]. "Application of Green Cloud Computing for Efficient Resource Energy Management in Data Centres" Yuvapriya Ponnusamy et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (5) , 2012,5101 – 5107
[2]. http://www.jetir.org/papers/JETIR1504053.pdf
[3]. "A Survey on Green Computing Techniques" , (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (5) , 2014, 6248-6252
[4]. B. Priya, E. S. Pilli and R. C. Joshi, (Eds.), "A Survey on Energy and Power Consumption Models for Greener Cloud", roceeding of the IEEE 3rd International Advance Computing Conference (IACC), (2013), February 22-23; Ghaziabad
[5]. S. Sharma, C.-H. Hsu, and W. chun Feng, "Making a case for a green500 list." in IEEE International Parallel and Distributed Processing Symposium (IPDPS 2006)/ Workshop on High Performance - Power Aware Computing, 2006.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Review On Security Approach In Big Data |
Country | : | India |
Authors | : | Ms. Chetana Girish Gorakh || Dr. Kishor M. Dhole |
Abstract: Today we are living in the digital world, so everyday substantial amount of data generated and it is very tedious job to manage, acquire, access, deploy and store large scale of data. Traditional databases are not compatible to manage, store and analyze heterogeneous data generated every day. Hence it needs to study concepts which identify newest techniques, methods to provide high security of data configuration and extraction in big data environment..........
Keywords: Big data, map reduce, Hadoop, security and privacy, big data analytics.
[1]. Sangita Bansal , Dr. Ajay Rana , Department of Computer Science and engineering Amity university , Noida ( U. P.) India , transitioning From relational databases to big data , International journal of advanced research in computer science and software engineering valume 4 , Issue 1, January 2014
[2]. Punit singh Duggal and sanchita paul , Department of computer science and engineering , Birla institute of technology ,mesra , Ranchi ,India , Big data analysis : Challenge and solution ,International conference on cloud , big data and trust 2013 , nov 13-15 ,RGPV.
[3]. Raghav Toshniwal , kanishka Ghosh Dastidar ,Ashok Nath ,department of computer science ,st. xaviers college (autonomous) kollata,india , Big Data Security issue and challenge, International Journal of Innovative in Advanced Engineering (IJIRAE) ISSN:2349-2163 ISSUE 2, Volume 2 (February2015).