SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 4124
Simultaneous ammunition for the multi-cloud computing simulation
Mr. Sunny Bhadlawala1, Prof (Dr.) S.S. Srivastava2
1Ph.D. (Pursing), M.Tech, B.E., MCP, MCTS, Research Scholar, Dept. of Computer Science & Engineering
AISECT UNIVERSITY,
2Dept. of Computer Science & Engineering, AISECT UNIVERSITY
---------------------------------------------------------------------------***---------------------------------------------------------------------------
Abstract— In this research report, we analyze multi-cloud
securities and optical networks. This decision was explained
by the fact that the current spinal cord of cloud computing is
based on many factors and techniques including the
securities. Apart from that, we use the protocol and it is
forced to transfer the web to a specialist in web transfers
with nodes and broken networks in parts of the internet. The
protocol is designed for server-to-server that transfers data
over data and automates it for data transfer and
synchronization.
Keywords—cloud computing, multi-cloud computing,
replica.
1. INTRODUCTION
Cloud computing was in limited popularity; It is associated
with the software as it has been commonly used in a
variety of technologies, services and concepts that are
often virtualized infrastructure or hardware-on-demand,
utility computing, outsourcing, platforms and services, and
many other things at the heart of the IT industry.
A cloud is a type of parallel and distributed system that
includes the collection of the one and the virtualized
computer that is dynamically deployed and based on the
service level agreements established by the interaction
between the service provider and the consumer is
presented as a more unified computing resources.
Fig.1 Protocol based cloud computing.
Cloud computing is a model for accessing the ubiquitous,
practical on-demand network that accesses a shared pool
of configurable computing resources such as networks,
servers, storage, applications, and services.
This deployment can be fast and can be done with minimal
management effort or interaction with the service
provider.
As we can see in fig. Various network-enabled devices,
such as Smartphone's, tablets, desktops and notebooks,
use the cloud computing features of an Internet
connection.
You can store your data such as important documents,
training data, calendars, finances and many important
documents.
In such a situation, the secure placement of parts and
storage for advanced hacking techniques that are available
today is essential.
Cloud computing is its utility-oriented approach. More
than any other distributed computing trend, cloud
computing is geared towards distributing services with a
fixed pricing model, in most cases a pay-per-use strategy.
1.1. Cloud in house
The use of cloud-based in-house solutions is driven by the
need to store sensitive information in an organization's
premises. Companies like governments and banks prefer
to create and use private or corporate clouds, such as high
security requirements, privacy policies, and regulatory
concerns
Large organizations that have a large computer
infrastructure can copy cloud IT service delivery models
from cloud computing.
This idea has led to the concept of private clouds as
opposed to public clouds.
In the private cloud, all resources are tightly secured and
available within the organization.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 4125
It enables the payment of online storage, the rental of
virtual hardware or the use of development platforms and
their effective use without any minimum or minimum cost.
All of these operations can be billed to enter the credit
card information and access the highlighted services via a
web browser.
Although many cloud computing services are available
independently to individual users, enterprise-class
services are distributed according to a specific price plan.
In this case, users subscribe to the service and use a
service level agreement (SLA) to set up the service
provider that defines the quality service standards under
which services are provided.
1.2. Type of layers
Cloud computing is very easy for cloud customers like
access cloud, retrieve storage or important data, all
retrieved.
But internal clouds have been mentioned in three have
been built on the very important layers of these layers as
Software as Infrastructure as a Service (SaaS), Platform as
a Service (PaaS) and a Service (IaaS). Different cloud
service providers offer different types of services based on
these layers.
The software, which is at the first level, has as its services
various applications that provide an interface to eliminate
the user. This layer usually allows access to internal data
with some authentication mechanisms.
The second layer is a platform as a service, another
assignment of users in this layer request for the resources
required to cloud computing. Finally, the level of
infrastructure in which most of the time are virtual
machines and infrastructure that can request the user as
show in Fig. 2. Cloud computing shows different pyramid
layers.
Fig.2 The cloud master and slave servers
Every layer of the cloud has its weaknesses. Similar to
software in the form of a service, the layer uses an
authentication mechanism to verify the identity of the
owner on the document, but it can be corrupted if a person
receives a security code that has been verified for
authentication. Continuously.
1.2.1 Service layer
SaaS model allows users to use a software application as a
service
It has full administrative powers for its application and is
responsible for activities such as deployment, maintenance
and updating; it is suitable for customers who want to
have less administrative burden and concerns about
setting up a management software and want to update it.
Applications that support productivity and collaboration
are the best choice; For example,
Google Apps, online project management apps such as
Zoho Mail, Dzieva CRM applications such as Salesforce.com
Imple CRM and Microsoft Dynamics, etc.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 4126
Cloud services like SkyDrive, Google Docs and Dropbox.
Small and Medium Enterprises (SMEs) / Small and
Medium Businesses (SMB) User services such as ice-
skating.
1.3. Cryptography
It is a branch of security that proposes hundreds of
algorithms that can be used for secure communication
between different users or that can securely store data on
certain media.
This section provides methods for encryption, decryption,
and verification for a different purpose. Encryption is
meant to convert simple plain text into an encrypted text
that is not easy to understand.
To recover text from cipher text, a reverse process of
decryption encryption is performed. Different methods,
algorithms can be optimized like many hash algorithms
like AES, RSA, DES, Triple-DES and MD5.
It provides secure ways to generate a key that can be used
for sender-side encryption and decryption to the receiver
and with a secure mechanism for transmitting those keys.
2. PREVIOUSPAPERS STUDY
In a base paper [23], a common approach to ensuring data
security in cloud computing:
Cloud computing is the impending revolution due to its
performance, reach, low cost and many other luxury goods
in the IT industry.
It is a certified approach to maximizing capacity and
capabilities without investing in new infrastructure,
promoting new employees, or licensing new software.
It provides huge storage for data and faster data
processing for customers on the Internet. This essentially
changes the database and application software for large
data centers. The cloud, where the management of data
and services cannot be completely reliable
As a result, businesses are reluctant to shut down their
cloud computing business and therefore offer a wide range
of luxuries. The security of data in the cloud is an obstacle
to the implementation of cloud computing, one of the main
problems.
In this publication, an overview of various techniques and
special procedures has been proposed, which is sure to
keep data from the beginning of the data to the end. From
the owner to the cloud and then to the user, we can begin
with the classification of data, the basis of the three
cryptographic parameters presented by the user, i. privacy,
ii. Availability and iii. Integrity
The privacy policy is to use various measures such as
Secure Sockets Layer (SSL) 128-bit encryption and can be
fetched for 256-bit encryption as needed, Mac (Message
Authentication Code) Data Integrity Searchable encryption
and division of data into three sections used in the cloud
for storage
Provides extra protection and easy access to data in three
sections of data sharing. The user who wants to access the
data before he can enter the encrypted data for approval
must provide the owner's login identity and password.
3. PROPOSED APPROACH
Provides extra protection and easy access to data in three
sections of data sharing.
Before the data is accessed to access encrypted data and
enable the requirement for enabling storage data, the user
must enter the owner's login identity and password to log
in.
Here are two groups of I3 it that can be started with three
I3 it parameters.
e^:G1& G2
Where e = lim (1+1/x) x, x→∞)
H: {0, 1}*Zq
4
, H1: {0, 1}*G1
H2: {0, 1}* Zq
*
,
H3: G2 Zq.
User Registration:skID = s QID.
Storage space: M = {m1, m2,….,mn}  Zq
Data encapsulation: To guarantee the secure data
transmissions, after identifying the cloud server or the
verification agency, the cloud user pre-computes the
session key
keyID,CS or keyID,VA.
keyID,CS = H3 (e^(skID, QCS))
keyID,VA = H3 (e^(skID, QVA))
keyID,CS = H3 (e^(skCS, QID)).
Data receiving: After receiving the packets, CSP first
decrypts them by its own session key to obtain the data-
signature pairs {D,Ø} and checks the signatures by
verifying secret key skCS:
∑i=e^ (Ui + H2 (Ui|| mi|| ii) QID,skcs)
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 4127
Considering the fact that the major communication and
computation overhead comes from verification of the
signatures, we introduce an advanced protocol to further
reduce the computational and communication. The
computational complexity based on the protocol is:
e^(UA,skva) = ∑`
A Here combination ∑`
A and UA can be performed
incrementally with the computational cost but it almost
measured by the expensive pairing operations as
mentioned in the equation of e^.
4. SIMULATION
Cloudlet ID Status Data Centre ID VM Time Start Time Finish Time
1 SUCCESS 2 1 800 0 800
4 SUCCESS 2 1 801 0 801
7 SUCCESS 2 3 1601 1 1602
10 SUCCESS 2 3 802 801 1603
2 SUCCESS 2 7 802 1600 2402
3 SUCCESS 2 7 803 1600 2403
6 SUCCESS 2 6 801 3203 4004
9 SUCCESS 2 6 1600 3200 4800
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
nth SUCCESS 2 n t+tn t tn
Table - I: Cloud simulation
CONCLUSION
In this research paper we have implemented cloud
simulation and made number of app0..n to use cloudlet
and make their copy in to data centre 2 along with their
own id in that case the data centre will generate based on
the requirement or create virtual machine(VM) allow to
perform task of cloudlet or agents.
REFERENCES
[1]. SushmitaRuj, Milos Stojmenovic, Amiya Nayak,
“Privacy Preserving Access Control with Authentication
for Securing Data in Clouds”, 12th IEEE/ACM
International Symposium on Cluster, Cloud and Grid
Computing-2012.
[2]. Ming Li, Shucheng Yu, Yao Zheng, Kui Ren, and
Wenjing Lou, “Scalable and Secure Sharing of Personal
Health Records in Cloud Computing Using Attribute-
Based Encryption”, IEEE TRANSACTIONS ON
PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO.
1, JANUARY 2013.
[3]. DananThilakanathan, Shiping Chen, Surya Nepal
and Rafael A. Calvo, “Secure Data Sharing in the Cloud”,
security, Privacy and Trust in Cloud Systems 2014.
[4]. Anurag Porwal, RohitMaheshwari, B.L.Pal, Gaurav
Kakhani, “An Approach for Secure Data Transmission in
Private Cloud ”, IAENGEngineeringLettersInternational
Journal of Soft Computing and Engineering (IJSCE)
ISSN: 2231-2307, Volume-2, Issue-1, March 2012.
[5]. M.Sudha , M.Monica, “Enhanced Security
Framework to Ensure Data Security in Cloud
Computing Using Cryptography”, Advances in
Computer Science and its Applications 32 Vol. 1, No. 1,
March 2012.
[6]. ParsiKalpana, SudhaSingaraju, “Data Security in
Cloud Computing using RSA Algorithm”,
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 4128
ParsiKalpana ,et al, International Journal of Research in
Computer and Communication technology,IJRCCT, ISSN
2278-5841, Vol 1, Issue 4, September 2012.
[7]. KawserWazedNafi, TonnyShekhaKar, Sayed
AnisulHoque, Dr. M. M. A Hashem, “ A Newer User
Authentication, File encryption and Distributed Server
Based Cloud Computing security
architecture ”,(IJACSA) International Journal of
Advanced Computer Science and Applications, Vol. 3,
No. 10, 2012.
[8]. Ahmad Rashidi and NaserMovahhedinia, “A Model
for User Trust in Cloud Computing”, International
Journal on Cloud Computing: Services and
Architecture(IJCCSA),Vol.2, No.2, April 2012.
[9]. Mohammed A. AlZain, Ben Soh and Eric Pardede,
“A New Approach Using Redundancy Technique to
Improve Security in Cloud Computing”, Cyber Security,
Cyber Warfare and Digital Forensic (CyberSec), 2012
International Conference on 26-28 June 2012.
[10]. DimitriosZissis, DimitriosLekkas, “Addressing
cloud computing security issues”, Future Generation
Computer Systems 28 (2012) 583–592.
[11]. Mohammed A. AlZain, Eric Pardede, Ben Soh,
James A. Thom, “Cloud Computing Security: From
Single to Multi-Clouds”, 45th Hawaii International
Conference on System Sciences – 2012.
[12]. Lei Xu, XiaoxinWu,Xinwen Zhang, “CL-PRE: a
Certificateless Proxy Re-Encryption Scheme for Secure
Data Sharing with Public Cloud”, ASIACCS '12
Proceedings of the 7th ACM Symposium on
Information, Computer and Communications Security.
[13]. Jianxin Li, Bo Li, Tianyu Wo, Chunming Hu,
JinpengHuai, Lu Liu, K.P. Lam, “CyberGuarder: A
virtualization security assurance architecture for green
cloud computing”, Future Generation Computer
Systems 28 (2012) 379–390.
[14]. Deyan Chen, Hong Zhao, “Data Security and
Privacy Protection Issues in Cloud Computing”,
International Conference on Computer Science and
Electronics Engineering, 2012.
[15]. VeerrajuGampala, SrilakshmiInuganti, Satish
Muppidi , “Data Security in Cloud Computing with
Elliptic Curve Cryptography “, International Journal of
Soft Computing and Engineering (IJSCE) ISSN: 2231-
2307, Volume-2, Issue-3, July 2012.
[16]. D.H. Patil, Rakesh R. Bhavsar, Akshay S. Thorve,
“ Data Security over Cloud ”, International Conference
on Emerging Frontiers in Technology for Rural Area
(EFITRA) 2012 Proceedings published in International
Journal of Computer Applications® (IJCA).
[17]. EmanM.Mohamed, Hatem S. Abdelkader,
“Enhanced Data Security Model for Cloud Computing”,
The 8th International Conference on INFOrmatics and
Systems (INFOS2012) - 14-16 May.
[18]. K. R. C. Wang, Q. Wang and W. Lou, “Ensuring data
storage security in cloud computing,” in Proc. 17th
International Workshop on Quality of Service
(IWQoS ’09), pp. 1–9, 2009. N. I. of Standards and
Technology (NIST). http://www.nist.gov/itl/cloud/.
[19]. Boyang Wang, Baochun Li, and Hui Li, “Oruta:
Privacy-Preserving Public Auditing for Shared Data in
the Cloud”, Cloud Computing, IEEE Transactions on
(Volume:2 , Issue: 1 ), Jan.-March 2014.
[20]. W. Liu, “Research on cloud computing security
problem and strategy,” in Consumer Electronics,
Communications and Networks (CECNet), 2012 2nd
International Conference on, pp. 1216–1219, IEEE,
2012.
[21]. A. Reed, C. Rezek, and P. Simmonds, “Security
guidance for critical areas of focus in cloud computing
v3. 0,” Cloud Security Alliance, 2011.
[22]. S. Subashini and V. Kavitha, “A survey on security
issues in service delivery models of cloud computing,”
Journal of Network and Computer Applications, vol. 34,
no. 1, pp. 1–11, 2011.
[23]. S. K. Sood, “A combined approach to ensure data
security in cloud computing,” Journal of Network and
Computer Applications, vol. 35, no. 6, pp. 1831–1838,
2012.
[24]. Z. Mahmood, “Data location and security issues in
cloud computing,” in Emerging Intelligent Data and
Web Technologies (EIDWT), 2011 International
Conference on, pp. 49–54, IEEE, 2011.
[25]. Ronald Petrlic, Christoph Sorge, “Privacy-
Preserving DRM for Cloud Computing”, 26th
International Conference on Advanced Information
Networking and Applications Workshops-2012.

More Related Content

What's hot

Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Editor IJARCET
 
Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Khiro Mishra
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...IRJET Journal
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageIRJET Journal
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
 
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...IRJET Journal
 
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingIJMER
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingIRJET Journal
 
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service ProvidersA Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service Providersiosrjce
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security IssuesStelios Krasadakis
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelijcsit
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructurecsandit
 

What's hot (20)

Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
 
Paper1
Paper1Paper1
Paper1
 
Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 
B1802041217
B1802041217B1802041217
B1802041217
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
 
improve cloud security
improve cloud securityimprove cloud security
improve cloud security
 
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud Computing
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
 
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service ProvidersA Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
 
8. 9590 1-pb
8. 9590 1-pb8. 9590 1-pb
8. 9590 1-pb
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security Issues
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructure
 

Similar to IRJET- Simultaneous ammunition for the multi-cloud computing simulation

IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET Journal
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET Journal
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET Journal
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET Journal
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the MassesIRJET Journal
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...IRJET Journal
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSIJMER
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environmentsijfcstjournal
 
Proposed system for data security in distributed computing in using triple d...
Proposed system for data security in distributed computing in  using triple d...Proposed system for data security in distributed computing in  using triple d...
Proposed system for data security in distributed computing in using triple d...IJECEIAES
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
IRJET- An Overview on Cloud Computing and Challenges
IRJET-  	  An Overview on Cloud Computing and ChallengesIRJET-  	  An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and ChallengesIRJET Journal
 
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual ProtectionIRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual ProtectionIRJET Journal
 
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudAnonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudIRJET Journal
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsIRJET Journal
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGIRJET Journal
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingEditor IJMTER
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud ComputingIRJET Journal
 
5. ijece guideforauthors 2012 edit sat
5. ijece guideforauthors 2012 edit sat5. ijece guideforauthors 2012 edit sat
5. ijece guideforauthors 2012 edit satIAESIJEECS
 

Similar to IRJET- Simultaneous ammunition for the multi-cloud computing simulation (20)

IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
 
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
Proposed system for data security in distributed computing in using triple d...
Proposed system for data security in distributed computing in  using triple d...Proposed system for data security in distributed computing in  using triple d...
Proposed system for data security in distributed computing in using triple d...
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
IRJET- An Overview on Cloud Computing and Challenges
IRJET-  	  An Overview on Cloud Computing and ChallengesIRJET-  	  An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and Challenges
 
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual ProtectionIRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual Protection
 
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudAnonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in Cloud
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
 
5. ijece guideforauthors 2012 edit sat
5. ijece guideforauthors 2012 edit sat5. ijece guideforauthors 2012 edit sat
5. ijece guideforauthors 2012 edit sat
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 

Recently uploaded (20)

Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 

IRJET- Simultaneous ammunition for the multi-cloud computing simulation

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 4124 Simultaneous ammunition for the multi-cloud computing simulation Mr. Sunny Bhadlawala1, Prof (Dr.) S.S. Srivastava2 1Ph.D. (Pursing), M.Tech, B.E., MCP, MCTS, Research Scholar, Dept. of Computer Science & Engineering AISECT UNIVERSITY, 2Dept. of Computer Science & Engineering, AISECT UNIVERSITY ---------------------------------------------------------------------------***--------------------------------------------------------------------------- Abstract— In this research report, we analyze multi-cloud securities and optical networks. This decision was explained by the fact that the current spinal cord of cloud computing is based on many factors and techniques including the securities. Apart from that, we use the protocol and it is forced to transfer the web to a specialist in web transfers with nodes and broken networks in parts of the internet. The protocol is designed for server-to-server that transfers data over data and automates it for data transfer and synchronization. Keywords—cloud computing, multi-cloud computing, replica. 1. INTRODUCTION Cloud computing was in limited popularity; It is associated with the software as it has been commonly used in a variety of technologies, services and concepts that are often virtualized infrastructure or hardware-on-demand, utility computing, outsourcing, platforms and services, and many other things at the heart of the IT industry. A cloud is a type of parallel and distributed system that includes the collection of the one and the virtualized computer that is dynamically deployed and based on the service level agreements established by the interaction between the service provider and the consumer is presented as a more unified computing resources. Fig.1 Protocol based cloud computing. Cloud computing is a model for accessing the ubiquitous, practical on-demand network that accesses a shared pool of configurable computing resources such as networks, servers, storage, applications, and services. This deployment can be fast and can be done with minimal management effort or interaction with the service provider. As we can see in fig. Various network-enabled devices, such as Smartphone's, tablets, desktops and notebooks, use the cloud computing features of an Internet connection. You can store your data such as important documents, training data, calendars, finances and many important documents. In such a situation, the secure placement of parts and storage for advanced hacking techniques that are available today is essential. Cloud computing is its utility-oriented approach. More than any other distributed computing trend, cloud computing is geared towards distributing services with a fixed pricing model, in most cases a pay-per-use strategy. 1.1. Cloud in house The use of cloud-based in-house solutions is driven by the need to store sensitive information in an organization's premises. Companies like governments and banks prefer to create and use private or corporate clouds, such as high security requirements, privacy policies, and regulatory concerns Large organizations that have a large computer infrastructure can copy cloud IT service delivery models from cloud computing. This idea has led to the concept of private clouds as opposed to public clouds. In the private cloud, all resources are tightly secured and available within the organization.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 4125 It enables the payment of online storage, the rental of virtual hardware or the use of development platforms and their effective use without any minimum or minimum cost. All of these operations can be billed to enter the credit card information and access the highlighted services via a web browser. Although many cloud computing services are available independently to individual users, enterprise-class services are distributed according to a specific price plan. In this case, users subscribe to the service and use a service level agreement (SLA) to set up the service provider that defines the quality service standards under which services are provided. 1.2. Type of layers Cloud computing is very easy for cloud customers like access cloud, retrieve storage or important data, all retrieved. But internal clouds have been mentioned in three have been built on the very important layers of these layers as Software as Infrastructure as a Service (SaaS), Platform as a Service (PaaS) and a Service (IaaS). Different cloud service providers offer different types of services based on these layers. The software, which is at the first level, has as its services various applications that provide an interface to eliminate the user. This layer usually allows access to internal data with some authentication mechanisms. The second layer is a platform as a service, another assignment of users in this layer request for the resources required to cloud computing. Finally, the level of infrastructure in which most of the time are virtual machines and infrastructure that can request the user as show in Fig. 2. Cloud computing shows different pyramid layers. Fig.2 The cloud master and slave servers Every layer of the cloud has its weaknesses. Similar to software in the form of a service, the layer uses an authentication mechanism to verify the identity of the owner on the document, but it can be corrupted if a person receives a security code that has been verified for authentication. Continuously. 1.2.1 Service layer SaaS model allows users to use a software application as a service It has full administrative powers for its application and is responsible for activities such as deployment, maintenance and updating; it is suitable for customers who want to have less administrative burden and concerns about setting up a management software and want to update it. Applications that support productivity and collaboration are the best choice; For example, Google Apps, online project management apps such as Zoho Mail, Dzieva CRM applications such as Salesforce.com Imple CRM and Microsoft Dynamics, etc.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 4126 Cloud services like SkyDrive, Google Docs and Dropbox. Small and Medium Enterprises (SMEs) / Small and Medium Businesses (SMB) User services such as ice- skating. 1.3. Cryptography It is a branch of security that proposes hundreds of algorithms that can be used for secure communication between different users or that can securely store data on certain media. This section provides methods for encryption, decryption, and verification for a different purpose. Encryption is meant to convert simple plain text into an encrypted text that is not easy to understand. To recover text from cipher text, a reverse process of decryption encryption is performed. Different methods, algorithms can be optimized like many hash algorithms like AES, RSA, DES, Triple-DES and MD5. It provides secure ways to generate a key that can be used for sender-side encryption and decryption to the receiver and with a secure mechanism for transmitting those keys. 2. PREVIOUSPAPERS STUDY In a base paper [23], a common approach to ensuring data security in cloud computing: Cloud computing is the impending revolution due to its performance, reach, low cost and many other luxury goods in the IT industry. It is a certified approach to maximizing capacity and capabilities without investing in new infrastructure, promoting new employees, or licensing new software. It provides huge storage for data and faster data processing for customers on the Internet. This essentially changes the database and application software for large data centers. The cloud, where the management of data and services cannot be completely reliable As a result, businesses are reluctant to shut down their cloud computing business and therefore offer a wide range of luxuries. The security of data in the cloud is an obstacle to the implementation of cloud computing, one of the main problems. In this publication, an overview of various techniques and special procedures has been proposed, which is sure to keep data from the beginning of the data to the end. From the owner to the cloud and then to the user, we can begin with the classification of data, the basis of the three cryptographic parameters presented by the user, i. privacy, ii. Availability and iii. Integrity The privacy policy is to use various measures such as Secure Sockets Layer (SSL) 128-bit encryption and can be fetched for 256-bit encryption as needed, Mac (Message Authentication Code) Data Integrity Searchable encryption and division of data into three sections used in the cloud for storage Provides extra protection and easy access to data in three sections of data sharing. The user who wants to access the data before he can enter the encrypted data for approval must provide the owner's login identity and password. 3. PROPOSED APPROACH Provides extra protection and easy access to data in three sections of data sharing. Before the data is accessed to access encrypted data and enable the requirement for enabling storage data, the user must enter the owner's login identity and password to log in. Here are two groups of I3 it that can be started with three I3 it parameters. e^:G1& G2 Where e = lim (1+1/x) x, x→∞) H: {0, 1}*Zq 4 , H1: {0, 1}*G1 H2: {0, 1}* Zq * , H3: G2 Zq. User Registration:skID = s QID. Storage space: M = {m1, m2,….,mn}  Zq Data encapsulation: To guarantee the secure data transmissions, after identifying the cloud server or the verification agency, the cloud user pre-computes the session key keyID,CS or keyID,VA. keyID,CS = H3 (e^(skID, QCS)) keyID,VA = H3 (e^(skID, QVA)) keyID,CS = H3 (e^(skCS, QID)). Data receiving: After receiving the packets, CSP first decrypts them by its own session key to obtain the data- signature pairs {D,Ø} and checks the signatures by verifying secret key skCS: ∑i=e^ (Ui + H2 (Ui|| mi|| ii) QID,skcs)
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 4127 Considering the fact that the major communication and computation overhead comes from verification of the signatures, we introduce an advanced protocol to further reduce the computational and communication. The computational complexity based on the protocol is: e^(UA,skva) = ∑` A Here combination ∑` A and UA can be performed incrementally with the computational cost but it almost measured by the expensive pairing operations as mentioned in the equation of e^. 4. SIMULATION Cloudlet ID Status Data Centre ID VM Time Start Time Finish Time 1 SUCCESS 2 1 800 0 800 4 SUCCESS 2 1 801 0 801 7 SUCCESS 2 3 1601 1 1602 10 SUCCESS 2 3 802 801 1603 2 SUCCESS 2 7 802 1600 2402 3 SUCCESS 2 7 803 1600 2403 6 SUCCESS 2 6 801 3203 4004 9 SUCCESS 2 6 1600 3200 4800 . . . . . . . . . . . . . . . . . . . . . nth SUCCESS 2 n t+tn t tn Table - I: Cloud simulation CONCLUSION In this research paper we have implemented cloud simulation and made number of app0..n to use cloudlet and make their copy in to data centre 2 along with their own id in that case the data centre will generate based on the requirement or create virtual machine(VM) allow to perform task of cloudlet or agents. REFERENCES [1]. SushmitaRuj, Milos Stojmenovic, Amiya Nayak, “Privacy Preserving Access Control with Authentication for Securing Data in Clouds”, 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing-2012. [2]. Ming Li, Shucheng Yu, Yao Zheng, Kui Ren, and Wenjing Lou, “Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute- Based Encryption”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 1, JANUARY 2013. [3]. DananThilakanathan, Shiping Chen, Surya Nepal and Rafael A. Calvo, “Secure Data Sharing in the Cloud”, security, Privacy and Trust in Cloud Systems 2014. [4]. Anurag Porwal, RohitMaheshwari, B.L.Pal, Gaurav Kakhani, “An Approach for Secure Data Transmission in Private Cloud ”, IAENGEngineeringLettersInternational Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-1, March 2012. [5]. M.Sudha , M.Monica, “Enhanced Security Framework to Ensure Data Security in Cloud Computing Using Cryptography”, Advances in Computer Science and its Applications 32 Vol. 1, No. 1, March 2012. [6]. ParsiKalpana, SudhaSingaraju, “Data Security in Cloud Computing using RSA Algorithm”,
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 4128 ParsiKalpana ,et al, International Journal of Research in Computer and Communication technology,IJRCCT, ISSN 2278-5841, Vol 1, Issue 4, September 2012. [7]. KawserWazedNafi, TonnyShekhaKar, Sayed AnisulHoque, Dr. M. M. A Hashem, “ A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture ”,(IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 3, No. 10, 2012. [8]. Ahmad Rashidi and NaserMovahhedinia, “A Model for User Trust in Cloud Computing”, International Journal on Cloud Computing: Services and Architecture(IJCCSA),Vol.2, No.2, April 2012. [9]. Mohammed A. AlZain, Ben Soh and Eric Pardede, “A New Approach Using Redundancy Technique to Improve Security in Cloud Computing”, Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on 26-28 June 2012. [10]. DimitriosZissis, DimitriosLekkas, “Addressing cloud computing security issues”, Future Generation Computer Systems 28 (2012) 583–592. [11]. Mohammed A. AlZain, Eric Pardede, Ben Soh, James A. Thom, “Cloud Computing Security: From Single to Multi-Clouds”, 45th Hawaii International Conference on System Sciences – 2012. [12]. Lei Xu, XiaoxinWu,Xinwen Zhang, “CL-PRE: a Certificateless Proxy Re-Encryption Scheme for Secure Data Sharing with Public Cloud”, ASIACCS '12 Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. [13]. Jianxin Li, Bo Li, Tianyu Wo, Chunming Hu, JinpengHuai, Lu Liu, K.P. Lam, “CyberGuarder: A virtualization security assurance architecture for green cloud computing”, Future Generation Computer Systems 28 (2012) 379–390. [14]. Deyan Chen, Hong Zhao, “Data Security and Privacy Protection Issues in Cloud Computing”, International Conference on Computer Science and Electronics Engineering, 2012. [15]. VeerrajuGampala, SrilakshmiInuganti, Satish Muppidi , “Data Security in Cloud Computing with Elliptic Curve Cryptography “, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231- 2307, Volume-2, Issue-3, July 2012. [16]. D.H. Patil, Rakesh R. Bhavsar, Akshay S. Thorve, “ Data Security over Cloud ”, International Conference on Emerging Frontiers in Technology for Rural Area (EFITRA) 2012 Proceedings published in International Journal of Computer Applications® (IJCA). [17]. EmanM.Mohamed, Hatem S. Abdelkader, “Enhanced Data Security Model for Cloud Computing”, The 8th International Conference on INFOrmatics and Systems (INFOS2012) - 14-16 May. [18]. K. R. C. Wang, Q. Wang and W. Lou, “Ensuring data storage security in cloud computing,” in Proc. 17th International Workshop on Quality of Service (IWQoS ’09), pp. 1–9, 2009. N. I. of Standards and Technology (NIST). http://www.nist.gov/itl/cloud/. [19]. Boyang Wang, Baochun Li, and Hui Li, “Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud”, Cloud Computing, IEEE Transactions on (Volume:2 , Issue: 1 ), Jan.-March 2014. [20]. W. Liu, “Research on cloud computing security problem and strategy,” in Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on, pp. 1216–1219, IEEE, 2012. [21]. A. Reed, C. Rezek, and P. Simmonds, “Security guidance for critical areas of focus in cloud computing v3. 0,” Cloud Security Alliance, 2011. [22]. S. Subashini and V. Kavitha, “A survey on security issues in service delivery models of cloud computing,” Journal of Network and Computer Applications, vol. 34, no. 1, pp. 1–11, 2011. [23]. S. K. Sood, “A combined approach to ensure data security in cloud computing,” Journal of Network and Computer Applications, vol. 35, no. 6, pp. 1831–1838, 2012. [24]. Z. Mahmood, “Data location and security issues in cloud computing,” in Emerging Intelligent Data and Web Technologies (EIDWT), 2011 International Conference on, pp. 49–54, IEEE, 2011. [25]. Ronald Petrlic, Christoph Sorge, “Privacy- Preserving DRM for Cloud Computing”, 26th International Conference on Advanced Information Networking and Applications Workshops-2012.