Submit Search
Upload
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
•
0 likes
•
32 views
IRJET Journal
Follow
https://www.irjet.net/archives/V5/i3/IRJET-V5I3966.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 5
Download now
Download to read offline
Recommended
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
IJECEIAES
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
IRJET Journal
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER
A Secure Model for Cloud Computing Based Storage and Retrieval
A Secure Model for Cloud Computing Based Storage and Retrieval
IOSR Journals
Data Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear Programming
IOSR Journals
G033030035
G033030035
ijceronline
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
Recommended
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
IJECEIAES
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
IRJET Journal
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER
A Secure Model for Cloud Computing Based Storage and Retrieval
A Secure Model for Cloud Computing Based Storage and Retrieval
IOSR Journals
Data Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear Programming
IOSR Journals
G033030035
G033030035
ijceronline
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
IJCERT JOURNAL
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
Editor IJARCET
Paper1
Paper1
Vikas Khairnar
Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)
Khiro Mishra
Enhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
IRJET Journal
B1802041217
B1802041217
IOSR Journals
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
IRJET Journal
Ad4502189193
Ad4502189193
IJERA Editor
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Editor IJMTER
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
IRJET Journal
improve cloud security
improve cloud security
Balkees Shereek
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud Computing
IJMER
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
IRJET Journal
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
iosrjce
8. 9590 1-pb
8. 9590 1-pb
IAESIJEECS
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
Cloud Computing Security Issues
Cloud Computing Security Issues
Stelios Krasadakis
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
ijcsit
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructure
csandit
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET Journal
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
IRJET Journal
More Related Content
What's hot
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
IJCERT JOURNAL
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
Editor IJARCET
Paper1
Paper1
Vikas Khairnar
Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)
Khiro Mishra
Enhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
IRJET Journal
B1802041217
B1802041217
IOSR Journals
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
IRJET Journal
Ad4502189193
Ad4502189193
IJERA Editor
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Editor IJMTER
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
IRJET Journal
improve cloud security
improve cloud security
Balkees Shereek
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud Computing
IJMER
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
IRJET Journal
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
iosrjce
8. 9590 1-pb
8. 9590 1-pb
IAESIJEECS
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
Cloud Computing Security Issues
Cloud Computing Security Issues
Stelios Krasadakis
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
ijcsit
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructure
csandit
What's hot
(20)
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
Paper1
Paper1
Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)
Enhanced security framework to ensure data security
Enhanced security framework to ensure data security
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
B1802041217
B1802041217
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
Ad4502189193
Ad4502189193
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
improve cloud security
improve cloud security
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
8. 9590 1-pb
8. 9590 1-pb
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
Cloud Computing Security Issues
Cloud Computing Security Issues
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructure
Similar to IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET Journal
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
IRJET Journal
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET Journal
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET Journal
Cloud Data Protection for the Masses
Cloud Data Protection for the Masses
IRJET Journal
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
IRJET Journal
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
IJMER
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
ijfcstjournal
Proposed system for data security in distributed computing in using triple d...
Proposed system for data security in distributed computing in using triple d...
IJECEIAES
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET Journal
IRJET- An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and Challenges
IRJET Journal
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual Protection
IRJET Journal
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in Cloud
IRJET Journal
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
IRJET Journal
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
IRJET Journal
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
Editor IJMTER
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
idescitation
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET Journal
5. ijece guideforauthors 2012 edit sat
5. ijece guideforauthors 2012 edit sat
IAESIJEECS
Similar to IRJET- Simultaneous ammunition for the multi-cloud computing simulation
(20)
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- Homomorphic Encryption Scheme in Cloud Computing for Security and Priv...
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
Cloud Data Protection for the Masses
Cloud Data Protection for the Masses
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
Proposed system for data security in distributed computing in using triple d...
Proposed system for data security in distributed computing in using triple d...
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET- An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and Challenges
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual Protection
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in Cloud
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
5. ijece guideforauthors 2012 edit sat
5. ijece guideforauthors 2012 edit sat
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Satyam Kumar
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
roselinkalist12
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
britheesh05
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
Asst.prof M.Gokilavani
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
Dr SOUNDIRARAJ N
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
PoojaBan
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
koyaldeepu123
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
Tagore Institute of Engineering And Technology
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
KartikeyaDwivedi3
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
LewisJB
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
pipeline in computer architecture design
pipeline in computer architecture design
ssuser87fa0c1
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
VICTOR MAESTRE RAMIREZ
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
Chandu841456
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Anamika Sarkar
Recently uploaded
(20)
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
pipeline in computer architecture design
pipeline in computer architecture design
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 4124 Simultaneous ammunition for the multi-cloud computing simulation Mr. Sunny Bhadlawala1, Prof (Dr.) S.S. Srivastava2 1Ph.D. (Pursing), M.Tech, B.E., MCP, MCTS, Research Scholar, Dept. of Computer Science & Engineering AISECT UNIVERSITY, 2Dept. of Computer Science & Engineering, AISECT UNIVERSITY ---------------------------------------------------------------------------***--------------------------------------------------------------------------- Abstract— In this research report, we analyze multi-cloud securities and optical networks. This decision was explained by the fact that the current spinal cord of cloud computing is based on many factors and techniques including the securities. Apart from that, we use the protocol and it is forced to transfer the web to a specialist in web transfers with nodes and broken networks in parts of the internet. The protocol is designed for server-to-server that transfers data over data and automates it for data transfer and synchronization. Keywords—cloud computing, multi-cloud computing, replica. 1. INTRODUCTION Cloud computing was in limited popularity; It is associated with the software as it has been commonly used in a variety of technologies, services and concepts that are often virtualized infrastructure or hardware-on-demand, utility computing, outsourcing, platforms and services, and many other things at the heart of the IT industry. A cloud is a type of parallel and distributed system that includes the collection of the one and the virtualized computer that is dynamically deployed and based on the service level agreements established by the interaction between the service provider and the consumer is presented as a more unified computing resources. Fig.1 Protocol based cloud computing. Cloud computing is a model for accessing the ubiquitous, practical on-demand network that accesses a shared pool of configurable computing resources such as networks, servers, storage, applications, and services. This deployment can be fast and can be done with minimal management effort or interaction with the service provider. As we can see in fig. Various network-enabled devices, such as Smartphone's, tablets, desktops and notebooks, use the cloud computing features of an Internet connection. You can store your data such as important documents, training data, calendars, finances and many important documents. In such a situation, the secure placement of parts and storage for advanced hacking techniques that are available today is essential. Cloud computing is its utility-oriented approach. More than any other distributed computing trend, cloud computing is geared towards distributing services with a fixed pricing model, in most cases a pay-per-use strategy. 1.1. Cloud in house The use of cloud-based in-house solutions is driven by the need to store sensitive information in an organization's premises. Companies like governments and banks prefer to create and use private or corporate clouds, such as high security requirements, privacy policies, and regulatory concerns Large organizations that have a large computer infrastructure can copy cloud IT service delivery models from cloud computing. This idea has led to the concept of private clouds as opposed to public clouds. In the private cloud, all resources are tightly secured and available within the organization.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 4125 It enables the payment of online storage, the rental of virtual hardware or the use of development platforms and their effective use without any minimum or minimum cost. All of these operations can be billed to enter the credit card information and access the highlighted services via a web browser. Although many cloud computing services are available independently to individual users, enterprise-class services are distributed according to a specific price plan. In this case, users subscribe to the service and use a service level agreement (SLA) to set up the service provider that defines the quality service standards under which services are provided. 1.2. Type of layers Cloud computing is very easy for cloud customers like access cloud, retrieve storage or important data, all retrieved. But internal clouds have been mentioned in three have been built on the very important layers of these layers as Software as Infrastructure as a Service (SaaS), Platform as a Service (PaaS) and a Service (IaaS). Different cloud service providers offer different types of services based on these layers. The software, which is at the first level, has as its services various applications that provide an interface to eliminate the user. This layer usually allows access to internal data with some authentication mechanisms. The second layer is a platform as a service, another assignment of users in this layer request for the resources required to cloud computing. Finally, the level of infrastructure in which most of the time are virtual machines and infrastructure that can request the user as show in Fig. 2. Cloud computing shows different pyramid layers. Fig.2 The cloud master and slave servers Every layer of the cloud has its weaknesses. Similar to software in the form of a service, the layer uses an authentication mechanism to verify the identity of the owner on the document, but it can be corrupted if a person receives a security code that has been verified for authentication. Continuously. 1.2.1 Service layer SaaS model allows users to use a software application as a service It has full administrative powers for its application and is responsible for activities such as deployment, maintenance and updating; it is suitable for customers who want to have less administrative burden and concerns about setting up a management software and want to update it. Applications that support productivity and collaboration are the best choice; For example, Google Apps, online project management apps such as Zoho Mail, Dzieva CRM applications such as Salesforce.com Imple CRM and Microsoft Dynamics, etc.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 4126 Cloud services like SkyDrive, Google Docs and Dropbox. Small and Medium Enterprises (SMEs) / Small and Medium Businesses (SMB) User services such as ice- skating. 1.3. Cryptography It is a branch of security that proposes hundreds of algorithms that can be used for secure communication between different users or that can securely store data on certain media. This section provides methods for encryption, decryption, and verification for a different purpose. Encryption is meant to convert simple plain text into an encrypted text that is not easy to understand. To recover text from cipher text, a reverse process of decryption encryption is performed. Different methods, algorithms can be optimized like many hash algorithms like AES, RSA, DES, Triple-DES and MD5. It provides secure ways to generate a key that can be used for sender-side encryption and decryption to the receiver and with a secure mechanism for transmitting those keys. 2. PREVIOUSPAPERS STUDY In a base paper [23], a common approach to ensuring data security in cloud computing: Cloud computing is the impending revolution due to its performance, reach, low cost and many other luxury goods in the IT industry. It is a certified approach to maximizing capacity and capabilities without investing in new infrastructure, promoting new employees, or licensing new software. It provides huge storage for data and faster data processing for customers on the Internet. This essentially changes the database and application software for large data centers. The cloud, where the management of data and services cannot be completely reliable As a result, businesses are reluctant to shut down their cloud computing business and therefore offer a wide range of luxuries. The security of data in the cloud is an obstacle to the implementation of cloud computing, one of the main problems. In this publication, an overview of various techniques and special procedures has been proposed, which is sure to keep data from the beginning of the data to the end. From the owner to the cloud and then to the user, we can begin with the classification of data, the basis of the three cryptographic parameters presented by the user, i. privacy, ii. Availability and iii. Integrity The privacy policy is to use various measures such as Secure Sockets Layer (SSL) 128-bit encryption and can be fetched for 256-bit encryption as needed, Mac (Message Authentication Code) Data Integrity Searchable encryption and division of data into three sections used in the cloud for storage Provides extra protection and easy access to data in three sections of data sharing. The user who wants to access the data before he can enter the encrypted data for approval must provide the owner's login identity and password. 3. PROPOSED APPROACH Provides extra protection and easy access to data in three sections of data sharing. Before the data is accessed to access encrypted data and enable the requirement for enabling storage data, the user must enter the owner's login identity and password to log in. Here are two groups of I3 it that can be started with three I3 it parameters. e^:G1& G2 Where e = lim (1+1/x) x, x→∞) H: {0, 1}*Zq 4 , H1: {0, 1}*G1 H2: {0, 1}* Zq * , H3: G2 Zq. User Registration:skID = s QID. Storage space: M = {m1, m2,….,mn} Zq Data encapsulation: To guarantee the secure data transmissions, after identifying the cloud server or the verification agency, the cloud user pre-computes the session key keyID,CS or keyID,VA. keyID,CS = H3 (e^(skID, QCS)) keyID,VA = H3 (e^(skID, QVA)) keyID,CS = H3 (e^(skCS, QID)). Data receiving: After receiving the packets, CSP first decrypts them by its own session key to obtain the data- signature pairs {D,Ø} and checks the signatures by verifying secret key skCS: ∑i=e^ (Ui + H2 (Ui|| mi|| ii) QID,skcs)
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 4127 Considering the fact that the major communication and computation overhead comes from verification of the signatures, we introduce an advanced protocol to further reduce the computational and communication. The computational complexity based on the protocol is: e^(UA,skva) = ∑` A Here combination ∑` A and UA can be performed incrementally with the computational cost but it almost measured by the expensive pairing operations as mentioned in the equation of e^. 4. SIMULATION Cloudlet ID Status Data Centre ID VM Time Start Time Finish Time 1 SUCCESS 2 1 800 0 800 4 SUCCESS 2 1 801 0 801 7 SUCCESS 2 3 1601 1 1602 10 SUCCESS 2 3 802 801 1603 2 SUCCESS 2 7 802 1600 2402 3 SUCCESS 2 7 803 1600 2403 6 SUCCESS 2 6 801 3203 4004 9 SUCCESS 2 6 1600 3200 4800 . . . . . . . . . . . . . . . . . . . . . nth SUCCESS 2 n t+tn t tn Table - I: Cloud simulation CONCLUSION In this research paper we have implemented cloud simulation and made number of app0..n to use cloudlet and make their copy in to data centre 2 along with their own id in that case the data centre will generate based on the requirement or create virtual machine(VM) allow to perform task of cloudlet or agents. REFERENCES [1]. SushmitaRuj, Milos Stojmenovic, Amiya Nayak, “Privacy Preserving Access Control with Authentication for Securing Data in Clouds”, 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing-2012. [2]. Ming Li, Shucheng Yu, Yao Zheng, Kui Ren, and Wenjing Lou, “Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute- Based Encryption”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 1, JANUARY 2013. [3]. DananThilakanathan, Shiping Chen, Surya Nepal and Rafael A. Calvo, “Secure Data Sharing in the Cloud”, security, Privacy and Trust in Cloud Systems 2014. [4]. Anurag Porwal, RohitMaheshwari, B.L.Pal, Gaurav Kakhani, “An Approach for Secure Data Transmission in Private Cloud ”, IAENGEngineeringLettersInternational Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-1, March 2012. [5]. M.Sudha , M.Monica, “Enhanced Security Framework to Ensure Data Security in Cloud Computing Using Cryptography”, Advances in Computer Science and its Applications 32 Vol. 1, No. 1, March 2012. [6]. ParsiKalpana, SudhaSingaraju, “Data Security in Cloud Computing using RSA Algorithm”,
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 4128 ParsiKalpana ,et al, International Journal of Research in Computer and Communication technology,IJRCCT, ISSN 2278-5841, Vol 1, Issue 4, September 2012. [7]. KawserWazedNafi, TonnyShekhaKar, Sayed AnisulHoque, Dr. M. M. A Hashem, “ A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture ”,(IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 3, No. 10, 2012. [8]. Ahmad Rashidi and NaserMovahhedinia, “A Model for User Trust in Cloud Computing”, International Journal on Cloud Computing: Services and Architecture(IJCCSA),Vol.2, No.2, April 2012. [9]. Mohammed A. AlZain, Ben Soh and Eric Pardede, “A New Approach Using Redundancy Technique to Improve Security in Cloud Computing”, Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on 26-28 June 2012. [10]. DimitriosZissis, DimitriosLekkas, “Addressing cloud computing security issues”, Future Generation Computer Systems 28 (2012) 583–592. [11]. Mohammed A. AlZain, Eric Pardede, Ben Soh, James A. Thom, “Cloud Computing Security: From Single to Multi-Clouds”, 45th Hawaii International Conference on System Sciences – 2012. [12]. Lei Xu, XiaoxinWu,Xinwen Zhang, “CL-PRE: a Certificateless Proxy Re-Encryption Scheme for Secure Data Sharing with Public Cloud”, ASIACCS '12 Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. [13]. Jianxin Li, Bo Li, Tianyu Wo, Chunming Hu, JinpengHuai, Lu Liu, K.P. Lam, “CyberGuarder: A virtualization security assurance architecture for green cloud computing”, Future Generation Computer Systems 28 (2012) 379–390. [14]. Deyan Chen, Hong Zhao, “Data Security and Privacy Protection Issues in Cloud Computing”, International Conference on Computer Science and Electronics Engineering, 2012. [15]. VeerrajuGampala, SrilakshmiInuganti, Satish Muppidi , “Data Security in Cloud Computing with Elliptic Curve Cryptography “, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231- 2307, Volume-2, Issue-3, July 2012. [16]. D.H. Patil, Rakesh R. Bhavsar, Akshay S. Thorve, “ Data Security over Cloud ”, International Conference on Emerging Frontiers in Technology for Rural Area (EFITRA) 2012 Proceedings published in International Journal of Computer Applications® (IJCA). [17]. EmanM.Mohamed, Hatem S. Abdelkader, “Enhanced Data Security Model for Cloud Computing”, The 8th International Conference on INFOrmatics and Systems (INFOS2012) - 14-16 May. [18]. K. R. C. Wang, Q. Wang and W. Lou, “Ensuring data storage security in cloud computing,” in Proc. 17th International Workshop on Quality of Service (IWQoS ’09), pp. 1–9, 2009. N. I. of Standards and Technology (NIST). http://www.nist.gov/itl/cloud/. [19]. Boyang Wang, Baochun Li, and Hui Li, “Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud”, Cloud Computing, IEEE Transactions on (Volume:2 , Issue: 1 ), Jan.-March 2014. [20]. W. Liu, “Research on cloud computing security problem and strategy,” in Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on, pp. 1216–1219, IEEE, 2012. [21]. A. Reed, C. Rezek, and P. Simmonds, “Security guidance for critical areas of focus in cloud computing v3. 0,” Cloud Security Alliance, 2011. [22]. S. Subashini and V. Kavitha, “A survey on security issues in service delivery models of cloud computing,” Journal of Network and Computer Applications, vol. 34, no. 1, pp. 1–11, 2011. [23]. S. K. Sood, “A combined approach to ensure data security in cloud computing,” Journal of Network and Computer Applications, vol. 35, no. 6, pp. 1831–1838, 2012. [24]. Z. Mahmood, “Data location and security issues in cloud computing,” in Emerging Intelligent Data and Web Technologies (EIDWT), 2011 International Conference on, pp. 49–54, IEEE, 2011. [25]. Ronald Petrlic, Christoph Sorge, “Privacy- Preserving DRM for Cloud Computing”, 26th International Conference on Advanced Information Networking and Applications Workshops-2012.
Download now