This document discusses challenges related to security and service level agreements in cloud computing. It provides an overview of cloud computing architecture including different types of clouds (public, private, hybrid) and cloud service models (SaaS, PaaS, IaaS). Service level agreements define protocols between cloud service providers and customers regarding service expectations. However, security remains a major challenge as customer data stored in shared cloud environments faces risks like malicious attacks, data isolation issues, and long-term data viability concerns. Ensuring privacy and restricting access to authorized users while isolating customer data are important for addressing security issues in cloud computing.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Enhancing Data Integrity in Multi Cloud StorageIJERA Editor
Cloud computing is a way to increase the capacity or add capabilities dynamically without investing in new infrastructure, training new personnel, or licensing new software. Cloud is surrounded by many security issues like securing data and examining the utilization of cloud by the cloud computing vendors. Security is one of the major issues which reduce the growth of cloud computing. A large number of clients or data owners store their data on servers in the cloud and it is provided back to them whenever needed. The data provided should not be jeopardized. Data integrity should be taken into account so that the data is correct, consistent and accessible. For ensuring the integrity in cloud computing environment, cloud storage providers should be trusted. Dealing with single cloud providers is predicted to become less secure with customers due to risks of service availability, failure and the possibility of malicious insiders in the single cloud. This paper deals with multi cloud environments to resolve these issues. The integrity of the data in multi cloud storage has been provided with the help of trusted third party using cryptographic algorithm.
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
Cloud computing is a model for enabling convenient, on-demand network access
to a shared pool of configurable computing resources. Reliability in compute cloud is an
important aspect in Quality of Service which needs to be addressed in order to foster the
adoption of compute cloud. In today’s integrated environment the distributed systems is
employed to carry out computational intensive task at a faster rate without much
investment. The Cloud is a multitenant architecture which allows faster computation with
high scalability at a lower cost thereby the users can share the same physical infrastructure.
Individual customers deploy their applications in such environment will occupy the virtual
partitions on the platform. This paper describes a straightforward procedure to analyze the
reliability of the application from the view point of the resource provider. A trust
component is implemented to provide preventive control and to mitigate the occurrence of
any non-permissible action by using the detective mechanism. Such mechanisms are used to
identify the privacy risk and it further prevents from utilization. Hence, in this paper trust
assessment is performed before the user is allowed to share the multitenant infrastructure.
The cloud can provide scalable and reliable service for the legitimate users. The proposed
work is tested using tools Aneka and Globus Toolkit.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Overview of cloud computing architectureeSAT Journals
Abstract
This Research paper explores cloud computing architecture, service delivery models, Security & Privacy Issues and Trust Challenges. Evaluates all three service delivery models Software-as-a-Service (Saas), Platform-as-a-Service (PaaS) and Infrastructure-as-a-service (IaaS) and their deployment, requirements and services they provide. In the next section Security & Privacy Issues has been discussed and focus is on potential reasons for them to cause. Also discusses the lack of common cloud security standards with constructive discussion on public cloud providers and on their proprietary security standards. Overview on Challenges with Trust between Cloud provider and cloud user and suggests solutions for inculcating trust among cloud provider and cloud user with the help of trusted thrid party. Solutions and recommendations are suggested to safeguard user Data in the cloud by implementing Data security measures such as use of Crypotography and Trusted platform module (TPM), Data integrity etc. This research paper also focuses on future scope of cloud computing and its evolution in the field of outsourcing and urges on the need of global security standards for mitigating security issues, privacy threats and Trust challenges for wide acceptance of cloud computing in organizations. Keywords: Cloud Computing Challenges, Service Delivery Models, Data Security, Security & Privacy Issues, Trust
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Enhancing Data Integrity in Multi Cloud StorageIJERA Editor
Cloud computing is a way to increase the capacity or add capabilities dynamically without investing in new infrastructure, training new personnel, or licensing new software. Cloud is surrounded by many security issues like securing data and examining the utilization of cloud by the cloud computing vendors. Security is one of the major issues which reduce the growth of cloud computing. A large number of clients or data owners store their data on servers in the cloud and it is provided back to them whenever needed. The data provided should not be jeopardized. Data integrity should be taken into account so that the data is correct, consistent and accessible. For ensuring the integrity in cloud computing environment, cloud storage providers should be trusted. Dealing with single cloud providers is predicted to become less secure with customers due to risks of service availability, failure and the possibility of malicious insiders in the single cloud. This paper deals with multi cloud environments to resolve these issues. The integrity of the data in multi cloud storage has been provided with the help of trusted third party using cryptographic algorithm.
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
Cloud computing is a model for enabling convenient, on-demand network access
to a shared pool of configurable computing resources. Reliability in compute cloud is an
important aspect in Quality of Service which needs to be addressed in order to foster the
adoption of compute cloud. In today’s integrated environment the distributed systems is
employed to carry out computational intensive task at a faster rate without much
investment. The Cloud is a multitenant architecture which allows faster computation with
high scalability at a lower cost thereby the users can share the same physical infrastructure.
Individual customers deploy their applications in such environment will occupy the virtual
partitions on the platform. This paper describes a straightforward procedure to analyze the
reliability of the application from the view point of the resource provider. A trust
component is implemented to provide preventive control and to mitigate the occurrence of
any non-permissible action by using the detective mechanism. Such mechanisms are used to
identify the privacy risk and it further prevents from utilization. Hence, in this paper trust
assessment is performed before the user is allowed to share the multitenant infrastructure.
The cloud can provide scalable and reliable service for the legitimate users. The proposed
work is tested using tools Aneka and Globus Toolkit.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Overview of cloud computing architectureeSAT Journals
Abstract
This Research paper explores cloud computing architecture, service delivery models, Security & Privacy Issues and Trust Challenges. Evaluates all three service delivery models Software-as-a-Service (Saas), Platform-as-a-Service (PaaS) and Infrastructure-as-a-service (IaaS) and their deployment, requirements and services they provide. In the next section Security & Privacy Issues has been discussed and focus is on potential reasons for them to cause. Also discusses the lack of common cloud security standards with constructive discussion on public cloud providers and on their proprietary security standards. Overview on Challenges with Trust between Cloud provider and cloud user and suggests solutions for inculcating trust among cloud provider and cloud user with the help of trusted thrid party. Solutions and recommendations are suggested to safeguard user Data in the cloud by implementing Data security measures such as use of Crypotography and Trusted platform module (TPM), Data integrity etc. This research paper also focuses on future scope of cloud computing and its evolution in the field of outsourcing and urges on the need of global security standards for mitigating security issues, privacy threats and Trust challenges for wide acceptance of cloud computing in organizations. Keywords: Cloud Computing Challenges, Service Delivery Models, Data Security, Security & Privacy Issues, Trust
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Cloud computing security through symmetric cipher modelijcsit
Cloud computing can be defined as an application and services which runs on distributed network using
virtualized and it is accessed through internet protocols and networking. Cloud computing resources and
virtual and limitless and information’s of the physical systems on which software running are abstracted
from the user. Cloud Computing is a style of computing in which dynamically scalable and often virtualized
resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or
control over the technology infrastructure in the "cloud" that supports them. To satisfy the needs of the
users the concept is to incorporate technologies which have the common theme of reliance on the internet
Software and data are stored on the servers whereas cloud computing services are provided through
applications online which can be accessed from web browsers. Lack of security and access control is the
major drawback in the cloud computing as the users deal with sensitive data to public clouds .Multiple
virtual machine in cloud can access insecure information flows as service provider; therefore to implement
the cloud it is necessary to build security. Therefore the main aim of this paper is to provide cloud
computing security through symmetric cipher model. This article proposes symmetric cipher model in
order to implement cloud computing security so that data can accessed and stored securely.
Software as a service for efficient cloud computingeSAT Journals
Abstract This Research paper explores importance of Software As A Service (SaaS) for efficient cloud computing in organizations and its implications. Enterprises now a days are betting big on SaaS and integrating this service delivery model of cloud computing architecture in their IT services. SaaS applications are service centric cloud computing delivery model used as IT Infrastructure which is multi-tenant architecture used to provide rich user experience with desired set of features requested by the cloud user. This research paper also discusses the importance of SaaS application architecture, functionality, efficiency, advantages and disadvantages. Keywords: Cloud Computing, Service Delivery Models, Software as a Service, SaaS Architecture.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...iosrjce
Cloud computing is an important transition that makes change in service oriented computing
technology. Cloud service provider follows pay-as-you-go pricing approach which means consumer uses as
many resources as he need and billed by the provider based on the resource consumed. CSP give a quality of
service in the form of a service level agreement. For transparent billing, each billing transaction should be
protected against forgery and false modifications. Although CSPs provide service billing records, they cannot
provide trustworthiness. It is due to user or CSP can modify the billing records. In this case even a third party
cannot confirm that the user’s record is correct or CSPs record is correct. To overcome these limitations we
introduced a secure billing system called THEMIS. For secure billing system THEMIS introduces a concept of
cloud notary authority (CNA). CNA generates mutually verifiable binding information that can be used to
resolve future disputes between user and CSP. This project will produce the secure billing through monitoring
the service level agreement (SLA) by using the SMon module. CNA can get a service logs from SMon and stored
it in a local repository for further reference. Even administrator of a cloud system cannot modify or falsify the
data.
User requirements and Resource Management is more important in cloud computing.
Automation of user requirements phase is still not available in a cloud scenario. User
requirements layer specifies the capacity of virtual machine required by the user and
applicatons to be placed within the virtual machine. Based on the history of user requirements
in an academic institution they could be converted into packages and the user selects the
appropriate package. User requirements are then mapped to both SMI and SLA for appropriate
package selection. Both the user requirements and packages rely on the underling infrastructure
resources. Hence effective resource management is must in academic institutions.
A study on security responsibilities and adoption in cloudeSAT Journals
Abstract Cloud computing is one of the popular enterprise models where computing resources are made available on-demand to the user as needed. Due to this increasing demand for more clouds there is an ever growing threat of security becoming a major issue. cloud computing is a construct that allows you to access applications that actually reside at a location other than your computer or other Internet-connected device, most often, this will be a distant data center. In a simple, topological sense, a cloud computing solution is made up of several elements: clients, the datacenter, and distributed servers. Each element has a purpose and plays a specific role in delivering a functional cloud based application, the increased degree of connectivity and the increasing amount of data has led many providers and in particular data centers to employ larger infrastructures with dynamic load and access balancing. So this paper shall look at ways in which security responsibilities and Cloud Adoption Keywords: Cloud Computing, Service models, Cloud Security, Secure Cloud Adoption,
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Cloud Computing is benefiting to both cloud hosts and consumers by providing elastic services as a utility. These
services are provided on the basis of Service Level Agreement (SLA). Security and privacy are major issues when dealing with a multi - tenant model of cloud. Consumers are provided computing power in terms of virtual machines (VMs). A consumer can have many VMs at a time. Multiple consumers can get different VMs from the same server. This may lead to cross-VM attacks. This paper introduces a new framework: SAFETY (Security Awareness Framework for Everyone's Task with You), for maintaining security from cross-VM attacks, Data
leakage, VM theft, VM escape, Hyper jacking and VM Hopping. Experiments and results show that this framework is suitable and can be used for secure operations at cloud host side.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Total interpretive structural modelling on enablers of cloud computingeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Addressing Security Issues and Challenges in Mobile Cloud ComputingEditor IJCATR
The emergence of cloud computing has brought tremendous impact on software organizations and software architecture design. With the development of cloud computing and mobile internet, mobile cloud computing is becoming a new mode of application. With the widespread development of mobile applications and advances in mobile cloud computing, some other forms of requirements and security issues have been emerged. Mobile cloud computing provides resources residing over cloud and services provided for mobile devices. These resources and services from cloud are available for mobile user over their mobile devices. It also provides benefits for developing specialized mobile applications for them. However, increased security and privacy risks exists due to data outsourcing and synchronization over the Internet. This research paper provides the review on mobile cloud computing, its security issues, challenges and suggests some solutions.
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSIJNSA Journal
Cloud computing is a new innovative model for enterprise in which information is permanently stored on the servers and also manage how and when different resources are allocate to the requested users. It provides distributed approach through which resources are allocated dynamically to the users without investing in the infrastructure or licensing the software’s on the client side. Using the cloud makes processing of information is more commodious but it also present them with new security problems about reliability.This phenomenon introduces serious problems regarding access mechanism to any information stored in the database and resources in the cloud. For the successful implementation of cloud computing it is necessary that we must know different areas where the security is needed. For this there should also governess strategy needed for secure communication between multi-clouds located in different geographical areas or in different countries. In this paper we discuss how to safely utilizing the benefit of cloud computing through the network where data security, provide authentication, integration, recovery, IP spoofing and Virtual Servers are the most captiousfields in the cloud.
Toward Cloud Computing: Security and Performanceijccsa
Security and performance are basic requirements for any system. They are considered the criteria for the
measurement of any progress in a security system. Security is an indicator that affects the level of
performance through the threats that influence the performance of parts of the cloud during the rendering
of services. Both security and performance demonstrate the efficiency of cloud computing which indicates
that the performance and security are measurements for the extent of the development of the cloud. In this
paper, the relationship between performance and security will be examined to know the extent of their
impact on the progress of cloud computing.
Improved spambase dataset prediction using svm rbf kernel with adaptive boosteSAT Journals
Abstract Spam is no more garbage but risk as it includes virus attachments and spyware agents which make the recipients’ system ruined, therefore, there is an emerging need for spam detection. Many spam detection techniques based on machine learning algorithms have been proposed. As the amount of spam has been increased tremendously using bulk mailing tools, spam detection techniques should deal with it. In this paper we have proposed Hybrid classifier Adaptive boost with support vector machine RBF kernel on Spambase dataset. We have also extracted the features first by Principal component analysis. General Terms: Email Spam classification. Keywords: Adaboost, classifier, ensemble, machine learning, spam email, SVM.
Effects of solidification time on mechanical properties and wear behaviour of...eSAT Journals
Abstract An investigation was carried out to understand the effects of solidification time of the cylindrical specimen on hardness, wear rate and the coefficient of friction of Aluminium alloy (LM4). The commercially available LM4 Aluminium alloy was melted in a crucible furnace under argon atmosphere. The molten metal was poured into sand moulds having dissimilar size holes. The cast rods were tested for Vickers micro-hardness, wear rate and the coefficient of friction. The solidification time increases from 0.22 to 0.61 seconds when the diameter varied from 20 to 35mm. It was found that the hardness of the alloy vary with the diameter of the rod. Wear rate is inversely proportional to the hardness of the alloy. It was observed that the yield strength and tensile strength are increases with hardness, whereas the % elongation decreases. Further, the coefficient of friction is independent of hardness and not affected by the sliding time. Wear rate decreases linearly with hardness. Keywords: LM4- alloy, coefficient of friction, wear rate, solidification time, sand cast.
Feasibility study of mtbe physical adsorption from polluted water on gac, pac...eSAT Journals
Abstract MTBE or Methyl Tertiary Butyl Ether is an organic compound, which is used to increase the gasoline Octane Number. At the beginning of 80’s, by discovering the undesirable effects of tetra ethyl lead usage in fuel, MTBE started to be used worldwide. But gradually the undesirable effects of MTBE on environment had been revealed. There are many technologies for MTBE removal from polluted water. Adsorption is the most conventional and economical technology. In this research, some experiments have been done for studying the adsorption of MTBE on different solid adsorbent in batch process. In these experiments a fixed amount of adsorbents including Granular Activated Carbon (GAC), Powdered Activated Carbon (PAC) and the Husk Rice Carbon (HRC) have been put in different one litter covered vessels containing water polluted with known initial MTBE concentration and stirring them. By measuring MTBE concentration in the vessel at different times the effect of different operating parameters such as temperature and pH have been studied on adsorption and optimum condition have been determined. The batch experimental results have been used to calculate the constant parameters of Freundlich and Langmuir adsorption isotherm equations for these systems. Keywords: MTBE, Adsorption, Activated Carbon, Husk Rice Carbon
Data reduction techniques for high dimensional biological dataeSAT Journals
Abstract
High dimensional biological datasets in recent years has been growing rapidly. Extracting the knowledge and analyzing highdimensional
biological data is one the key challenges in which variety and veracity are the two distinct characteristics. The
question that arises now is, how to perform dimensionality reduction for this heterogeneous data and how to develop a high
performance platform to efficiently analyze high dimensional biological data and how to find the useful things from this data. To
deeply discuss this issue, this paper begins with a brief introduction to data analytics available for biological data, followed by
the discussions of big data analytics and then a survey on various data reduction methods for biological data. We propose a dense
clustering algorithm for standard high dimensional biological data.
Keywords: Big Data Analytics, Dimensionality Reduction
Cloud computing security through symmetric cipher modelijcsit
Cloud computing can be defined as an application and services which runs on distributed network using
virtualized and it is accessed through internet protocols and networking. Cloud computing resources and
virtual and limitless and information’s of the physical systems on which software running are abstracted
from the user. Cloud Computing is a style of computing in which dynamically scalable and often virtualized
resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or
control over the technology infrastructure in the "cloud" that supports them. To satisfy the needs of the
users the concept is to incorporate technologies which have the common theme of reliance on the internet
Software and data are stored on the servers whereas cloud computing services are provided through
applications online which can be accessed from web browsers. Lack of security and access control is the
major drawback in the cloud computing as the users deal with sensitive data to public clouds .Multiple
virtual machine in cloud can access insecure information flows as service provider; therefore to implement
the cloud it is necessary to build security. Therefore the main aim of this paper is to provide cloud
computing security through symmetric cipher model. This article proposes symmetric cipher model in
order to implement cloud computing security so that data can accessed and stored securely.
Software as a service for efficient cloud computingeSAT Journals
Abstract This Research paper explores importance of Software As A Service (SaaS) for efficient cloud computing in organizations and its implications. Enterprises now a days are betting big on SaaS and integrating this service delivery model of cloud computing architecture in their IT services. SaaS applications are service centric cloud computing delivery model used as IT Infrastructure which is multi-tenant architecture used to provide rich user experience with desired set of features requested by the cloud user. This research paper also discusses the importance of SaaS application architecture, functionality, efficiency, advantages and disadvantages. Keywords: Cloud Computing, Service Delivery Models, Software as a Service, SaaS Architecture.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...iosrjce
Cloud computing is an important transition that makes change in service oriented computing
technology. Cloud service provider follows pay-as-you-go pricing approach which means consumer uses as
many resources as he need and billed by the provider based on the resource consumed. CSP give a quality of
service in the form of a service level agreement. For transparent billing, each billing transaction should be
protected against forgery and false modifications. Although CSPs provide service billing records, they cannot
provide trustworthiness. It is due to user or CSP can modify the billing records. In this case even a third party
cannot confirm that the user’s record is correct or CSPs record is correct. To overcome these limitations we
introduced a secure billing system called THEMIS. For secure billing system THEMIS introduces a concept of
cloud notary authority (CNA). CNA generates mutually verifiable binding information that can be used to
resolve future disputes between user and CSP. This project will produce the secure billing through monitoring
the service level agreement (SLA) by using the SMon module. CNA can get a service logs from SMon and stored
it in a local repository for further reference. Even administrator of a cloud system cannot modify or falsify the
data.
User requirements and Resource Management is more important in cloud computing.
Automation of user requirements phase is still not available in a cloud scenario. User
requirements layer specifies the capacity of virtual machine required by the user and
applicatons to be placed within the virtual machine. Based on the history of user requirements
in an academic institution they could be converted into packages and the user selects the
appropriate package. User requirements are then mapped to both SMI and SLA for appropriate
package selection. Both the user requirements and packages rely on the underling infrastructure
resources. Hence effective resource management is must in academic institutions.
A study on security responsibilities and adoption in cloudeSAT Journals
Abstract Cloud computing is one of the popular enterprise models where computing resources are made available on-demand to the user as needed. Due to this increasing demand for more clouds there is an ever growing threat of security becoming a major issue. cloud computing is a construct that allows you to access applications that actually reside at a location other than your computer or other Internet-connected device, most often, this will be a distant data center. In a simple, topological sense, a cloud computing solution is made up of several elements: clients, the datacenter, and distributed servers. Each element has a purpose and plays a specific role in delivering a functional cloud based application, the increased degree of connectivity and the increasing amount of data has led many providers and in particular data centers to employ larger infrastructures with dynamic load and access balancing. So this paper shall look at ways in which security responsibilities and Cloud Adoption Keywords: Cloud Computing, Service models, Cloud Security, Secure Cloud Adoption,
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Cloud Computing is benefiting to both cloud hosts and consumers by providing elastic services as a utility. These
services are provided on the basis of Service Level Agreement (SLA). Security and privacy are major issues when dealing with a multi - tenant model of cloud. Consumers are provided computing power in terms of virtual machines (VMs). A consumer can have many VMs at a time. Multiple consumers can get different VMs from the same server. This may lead to cross-VM attacks. This paper introduces a new framework: SAFETY (Security Awareness Framework for Everyone's Task with You), for maintaining security from cross-VM attacks, Data
leakage, VM theft, VM escape, Hyper jacking and VM Hopping. Experiments and results show that this framework is suitable and can be used for secure operations at cloud host side.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Total interpretive structural modelling on enablers of cloud computingeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Addressing Security Issues and Challenges in Mobile Cloud ComputingEditor IJCATR
The emergence of cloud computing has brought tremendous impact on software organizations and software architecture design. With the development of cloud computing and mobile internet, mobile cloud computing is becoming a new mode of application. With the widespread development of mobile applications and advances in mobile cloud computing, some other forms of requirements and security issues have been emerged. Mobile cloud computing provides resources residing over cloud and services provided for mobile devices. These resources and services from cloud are available for mobile user over their mobile devices. It also provides benefits for developing specialized mobile applications for them. However, increased security and privacy risks exists due to data outsourcing and synchronization over the Internet. This research paper provides the review on mobile cloud computing, its security issues, challenges and suggests some solutions.
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSIJNSA Journal
Cloud computing is a new innovative model for enterprise in which information is permanently stored on the servers and also manage how and when different resources are allocate to the requested users. It provides distributed approach through which resources are allocated dynamically to the users without investing in the infrastructure or licensing the software’s on the client side. Using the cloud makes processing of information is more commodious but it also present them with new security problems about reliability.This phenomenon introduces serious problems regarding access mechanism to any information stored in the database and resources in the cloud. For the successful implementation of cloud computing it is necessary that we must know different areas where the security is needed. For this there should also governess strategy needed for secure communication between multi-clouds located in different geographical areas or in different countries. In this paper we discuss how to safely utilizing the benefit of cloud computing through the network where data security, provide authentication, integration, recovery, IP spoofing and Virtual Servers are the most captiousfields in the cloud.
Toward Cloud Computing: Security and Performanceijccsa
Security and performance are basic requirements for any system. They are considered the criteria for the
measurement of any progress in a security system. Security is an indicator that affects the level of
performance through the threats that influence the performance of parts of the cloud during the rendering
of services. Both security and performance demonstrate the efficiency of cloud computing which indicates
that the performance and security are measurements for the extent of the development of the cloud. In this
paper, the relationship between performance and security will be examined to know the extent of their
impact on the progress of cloud computing.
Improved spambase dataset prediction using svm rbf kernel with adaptive boosteSAT Journals
Abstract Spam is no more garbage but risk as it includes virus attachments and spyware agents which make the recipients’ system ruined, therefore, there is an emerging need for spam detection. Many spam detection techniques based on machine learning algorithms have been proposed. As the amount of spam has been increased tremendously using bulk mailing tools, spam detection techniques should deal with it. In this paper we have proposed Hybrid classifier Adaptive boost with support vector machine RBF kernel on Spambase dataset. We have also extracted the features first by Principal component analysis. General Terms: Email Spam classification. Keywords: Adaboost, classifier, ensemble, machine learning, spam email, SVM.
Effects of solidification time on mechanical properties and wear behaviour of...eSAT Journals
Abstract An investigation was carried out to understand the effects of solidification time of the cylindrical specimen on hardness, wear rate and the coefficient of friction of Aluminium alloy (LM4). The commercially available LM4 Aluminium alloy was melted in a crucible furnace under argon atmosphere. The molten metal was poured into sand moulds having dissimilar size holes. The cast rods were tested for Vickers micro-hardness, wear rate and the coefficient of friction. The solidification time increases from 0.22 to 0.61 seconds when the diameter varied from 20 to 35mm. It was found that the hardness of the alloy vary with the diameter of the rod. Wear rate is inversely proportional to the hardness of the alloy. It was observed that the yield strength and tensile strength are increases with hardness, whereas the % elongation decreases. Further, the coefficient of friction is independent of hardness and not affected by the sliding time. Wear rate decreases linearly with hardness. Keywords: LM4- alloy, coefficient of friction, wear rate, solidification time, sand cast.
Feasibility study of mtbe physical adsorption from polluted water on gac, pac...eSAT Journals
Abstract MTBE or Methyl Tertiary Butyl Ether is an organic compound, which is used to increase the gasoline Octane Number. At the beginning of 80’s, by discovering the undesirable effects of tetra ethyl lead usage in fuel, MTBE started to be used worldwide. But gradually the undesirable effects of MTBE on environment had been revealed. There are many technologies for MTBE removal from polluted water. Adsorption is the most conventional and economical technology. In this research, some experiments have been done for studying the adsorption of MTBE on different solid adsorbent in batch process. In these experiments a fixed amount of adsorbents including Granular Activated Carbon (GAC), Powdered Activated Carbon (PAC) and the Husk Rice Carbon (HRC) have been put in different one litter covered vessels containing water polluted with known initial MTBE concentration and stirring them. By measuring MTBE concentration in the vessel at different times the effect of different operating parameters such as temperature and pH have been studied on adsorption and optimum condition have been determined. The batch experimental results have been used to calculate the constant parameters of Freundlich and Langmuir adsorption isotherm equations for these systems. Keywords: MTBE, Adsorption, Activated Carbon, Husk Rice Carbon
Data reduction techniques for high dimensional biological dataeSAT Journals
Abstract
High dimensional biological datasets in recent years has been growing rapidly. Extracting the knowledge and analyzing highdimensional
biological data is one the key challenges in which variety and veracity are the two distinct characteristics. The
question that arises now is, how to perform dimensionality reduction for this heterogeneous data and how to develop a high
performance platform to efficiently analyze high dimensional biological data and how to find the useful things from this data. To
deeply discuss this issue, this paper begins with a brief introduction to data analytics available for biological data, followed by
the discussions of big data analytics and then a survey on various data reduction methods for biological data. We propose a dense
clustering algorithm for standard high dimensional biological data.
Keywords: Big Data Analytics, Dimensionality Reduction
A new conceptual algorithm for adaptive route changing in urban environmentseSAT Journals
Abstract In this paper an attempt is shown in a Mathematical Model of an alternating route adapting for large scale, which was previously done in small scale. This evaluation is done considering 75 and above traffic junctions with a scale of 4 to 6 vehicular density per second in each junction. The main objective of this paper is to show how an Adaptive Route Changing [ARC] application responds to assumed scenario & also proposing effective software architecture to monitor traffic in all the junctions at real time to minimise traffic congestion. Keywords : ARC, Intelligent transport system, Traffic Monitoring.
Environmental impact due to the doubling of green house gases through global ...eSAT Journals
Abstract
Anthropogenic carbon is responsible for both global warming and ocean acidification. Efforts are underway to understand the role of the ocean in a high CO2 world on a global context. Atmospheric carbon dioxide (CO2) concentration has continued to increase and is now almost 100 ppm above its pre-industrial level. Combining our reconstruction with the known history of the anthropogenic emissions gives us a more precise and detailed view of the terrestrial biosphere sink. The term 'Greenhouse Effect' refers to the way certain gases trap heat in the atmosphere, much as the glass in a greenhouse prevents rising warm air from escaping. The greenhouse effect is a process where energy from the sun readily penetrates into the lower atmosphere and onto the surface of Earth and is converted to heat, but then cannot freely leave the planet. Due to the presence of certain greenhouse gases that trap heat, like carbon dioxide, methane, water vapour, and CFCs, the atmosphere retains the suns radiation and warms up the planet. By increasing the abundance of these gases in the atmosphere, humankind is increasing the overall warming of the Earth’s surface and lower atmosphere, a process called "global warming. CO2 is a greenhouse gas and as the IPCC report shows, its radiative effect is greater than that of all the other anthropogenic GHG gases.
Efficient reconfigurable architecture of baseband demodulator in sdreSAT Journals
Abstract This paper presents the simulation architecture and performance analysis with the use of ZCD technic. A Zero-Crossing based All-Digital Baseband Demodulation architecture is proposed in this work. This architecture supports demodulation of all modulation schemes including MSK, PSK, FSK, and QAM. The proposed structure is very low area, low power, and low latency and can operate in real-time. Moreover it can switch, in run-time, between multiple modulation schemes like GMSK (GSM), QPSK (CDMA), GFSK (Bluetooth), 8-PSK (EDGE), Offset-QPSK (W-CDMA), etc. In addition, the phase resolution of the demodulator is scalable with performance. In addition, bit-wise amplitude quantization based quad-decomposition approach is utilized to demodulate higher order M-ary QAM modulations such as 16-QAM & 64-QAM, which is also a highly scalable architecture. This structure of demodulator provides energy-efficient and resource-efficient implementation of various wireless standards in physical layer of SDR. Keywords — Physical layer, Mobile and Wireless Communication, Software Defined radio (SDR), Zero Cross Detection (ZCD), Modulation Schemes, Architecture, high level synthesis, FPGA.
Analysis of problems of biomass grinder integrated with briquetting planteSAT Journals
Abstract In briquetting plant, briquettes are produced through small pieces of soybean stalk, pigeon pea straw, lantana stalk, cotton stalk with moisture content below 10%. Biomass grinding machine is an important part of the briquetting plant, whose function is to convert aggregate material in to small pieces. Biomass grinder consists of mainly hammer, grate and shaft. Shaft is an essential component of grinding machine, when holds hammers, pulley and fan. The failures of shaft bearing were observed due to non uniform distribution of stress. The study was under taken to conduct simulation study of shaft for stress analysis with the help of FE software ANSYS 12.0.1. Keywords: Biomass Grinder, FEM, Stress-strain, Stepped Shaft
Automatic test packet generation in networkeSAT Journals
Abstract Now a day’s we see that networks are widely distributed so administrators depends on various tools such as ping and traceroute to rectify the problem in the network. We proposed an automated and systematic approach for testing and debugging network called "Automatic Test Packet Generation"(ATPG). Initially ATPG reads router configuration and then generates a model which is device freelance. The model is used to generate the minimum number of test packets to cover every link and rule in network. ATPG is capable for detecting both functional and performance problems. Test packets are sent at regular intervals and special technique is used to localize faults. Keywords: Test Packet Generation Algorithm; Network Troubleshooting; Data Plane Analysis.
Studies on seasonal variation of ground water quality using multivariate anal...eSAT Journals
Abstract
In this study the seasonal variability of groundwater quality parameters in Bidar urban and its industrial area are investigated. Three
water samples each from 35 wards were collected and subjected for physico-chemical analysis. Average of the three samples represents
each ward data. Analysis was done for pre-monsoon and post-monsoon seasons of the years 2009, 2010 & 2011. Seventeen physicochemical
parameters viz., pH, total hardness, calcium, magnesium, chloride, nitrate, sulfate, total dissolved solids, iron, fluoride,
sodium, potassium, alkalinity, manganese, zinc, dissolved oxygen & total solids were analyzed. Factor analysis is applied on the data
set to investigate the origin of the water pollution sources. FA yielded three factors for each season (combined pre-monsoon &
combined post-monsoon) with 62.8% and 61.6 % total variance respectively; in addition FA identifies anthropogenic factor (i.e.,
industrial, urban sewage and agricultural drainage) and natural factor (top soil mixture with water and percolation, weathering of
ground strata) as latent pollution sources. Hierarchical cluster analysis grouped 35 sampling stations of Bidar urban into three
clusters, i.e., relatively less polluted (LP), and moderately polluted (MP) and highly polluted (HP) sites, based on the similarity of water
quality characteristics.
Keywords: Bidar urban & its industrial area, Ground water quality, Correlation coefficients, Factor analysis, Cluster
analysis
Abstract Urban watersheds produce an instantaneous response to rainfall. That results in stormwater runoff in excess of the capacity of drainage systems. The excess stormwater must be managed to prevent flooding and erosion of streams. Management can be achieved with the help of structural stormwater Best Management Practices (BMPs). Detention ponds is one such BMP commonly found in the Austin, TX, USA. The City of Austin developed a plan to mitigate future events of flooding and erosion, resulting in the development and integration of stormwater BMP algorithms into the sub-hourly version of SWAT model. This paper deals with the development of a physically based algorithm for detention pond. The algorithm was tested using a previously flow-calibrated watershed in the Austin area. From the test results obtained it appears that the detention pond algorithm is functioning satisfactorily. The algorithm developed could be used a) to evaluate the functionality of individual detention pond b) to analyze the benefits of such structures at watershed or higher scales and c) as design tool. Keywords: flooding, detention, urban, watershed, BMP, algorithm, stormwater, modeling
Dynamic solar powered robot using dc dc sepic topologyeSAT Journals
Abstract This paper provides an idea to maintain constant voltage to the charging battery at both low and high level light intensity by using SEPIC topology in solar powered robot. Here two batteries are used, one is for charging and another is for discharging. When battery 1 get charged in mean time the battery 2 which is already charged is used to run the robot, Switching will be controlled by ARM processor using DPDT relay, and also voltage and current levels are monitored. Maximum Power Point tracking of solar will be done by single axis tracking system. Keywords: Battery system, Solar MPPT, Robot model, SEPIC topology
A survey on efficient no reference blur estimation methodseSAT Journals
Abstract Blur estimation in image processing has come to be of great importance in assessing the quality of images. This work presents a survey of no-reference blur estimation methods. A no-reference method is particularly useful, when the input image used for blur estimation does not have an available corresponding reference image. This paper provides a comparison of the methodologies of four no-reference blur estimation methods. The first method applies a scale adaptive technique of blur estimation to get better accuracy in the results. The second blur metric involves finding the energy using second order derivatives of an image using derivative pair of quadrature filters. The third blur metric is based on the kurtosis measurement in the discrete dyadic wavelet transform (DDWT) of the images. The fourth method of blur estimation is obtained by finding the ratio of sum of the edge widths of all the detected edges to the total number of edges. The results provided are useful in comparing the methods based on metrics like Spearman correlation coefficient. The results are obtained by evaluation on images from the Laboratory for Image and Video Engineering (LIVE) database. The various methods are evaluated on the images by adding varying content of noise. The performance is evaluated for 3 different categories namely Gaussian blur, motion blur and also JPEG2000 compressed images. Blur estimation finds its application in quality assessment, image fusion and auto-focusing in images. The sharpness of an image can also be found from the blur metric as sharpness is inversely proportional to blur. Sharpness metrics can also be combined with other metrics to measure overall quality of the image. Keywords: Blur estimation, blur, no-reference
A survey on full reference image quality assessment algorithmseSAT Journals
Abstract Image quality measurement is very important for various image processing applications such as recognition, retrieval, classification, compression, restoration and similar fields. The images may contain different types of distortions like blur, noise, contrast change etc. So it is essential to rate the image quality appropriately. Traditionally subjective rating methods are used to evaluate the quality of the image, in which humans rated the image quality based on time requirements. This is a costly process and it needs experts for evaluating image quality. Nowadays many image quality assessment algorithms are available for finding the quality of images. These are mainly based on the properties of human visual system. These image quality assessment algorithms are the objective methods for finding quality. Most of the methods are heuristic and limited to specific application environment. Whereas some methods perform efficiently and having comparable performance with the subjective ratings. Objective methods are easy for integrating into various image compression techniques and other image processing applications. Based on the availability of the image, image quality assessment algorithms are classified into full reference, reduced reference and no reference respectively. Full reference algorithms normally adopt a two stage structure including local quality measurement and pooling to get the quality value. The input for this two stage structure includes a reference image and a distorted image. This paper presents a survey on the existing image quality assessment algorithms based on full reference method, in which a reference image will be available for finding the quality of the distorted image. Keywords: Image distortion, Image quality assessment, Human visual system
Behaviour of 3 d rc frames with masonry infill under earthquake loads an ana...eSAT Journals
Abstract Moderate and astringent earthquakes have struck different places in the world, causing rigorous damage to reinforced concrete
structures. The bond between the structural elements and masonry in-fills of the building is habitually effected by Earthquake. The
voids between horizontal and vertical resisting elements of the building frame is filled by Masonry in-fills. An infill wall enhances
considerably the strength and rigidity of the structure. It has apperceived that frames with in-fills have more vigor and rigidity
compared to the bare frames Hence this study is about the demeanor of 3D-RC frames with and without masonry in-fills utilizing
E-TABS. parameters were studied like displacement, lateral load distribution, stiffness and overturning moment of the frames and
it is concluded that, the in-fill walls are needed to be considered while designing phase of the structures.
Keywords: Earthquake load, 3D RC Frame, Masonry In-Fill
Simulation of incremental conductance mppt with direct control method using c...eSAT Journals
Abstract PV Module Maximum Power Point Tracker (MPPT) is a photovoltaic system that uses the photovoltaic array as a source of electrical power supply. Every photovoltaic (PV) array has an optimum operating point, called the maximum power point, which varies depending on cell temperature, the insulation level and array voltage. The function of MPPT is needed to operate the PV array at its maximum power point. The design of a Maximum Peak Power Tracking (MPPT) is proposed utilizing a cuk converter topology. Solar panel voltage and current are continuously monitored by a MPPT, and the duty cycle of the cuk converter continuously adjusted to extract maximum power. The design consists of a PV array, DC-DC cuk converter and many such algorithms have been proposed. However, one particular algorithm, the Incremental Conductance method, claimed by many in the literature to be inferior to others, continues to be by far the most widely used method in commercial PV MPPT’s. The general model was implemented on Mat lab, and accepts irradiance and temperature as variable parameters and outputs the I-V characteristic and P-V characteristic Index Terms: PV system; Maximum power point tracking (MPPT); Incremental conductance (Inccond); digital signal processor (dsp)
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...eSAT Journals
Abstract A mobile ad hoc networks (MANET) is characterized by multihop wireless connectivity consisting of independent nodes which move dynamically by changing its network connectivity without the uses of any pre-existent infrastructure. MANET offers[1, 2] such flexibility which helps the network to form anywhere, at any time, as long as two or more nodes are connected and communicate with each other either directly when they are in radio range or via intermediate mobile nodes. Routing is a significant issue and challenge in ad hoc networks and many routing protocols have been proposed like OLSR, AODV, DSDV,DSR, ZRP, and TORA, LAR so far to improve the routing performance and reliability. This research paper describes the characteristics of ad hoc routing protocols OLSR, AODV and ZRP based on the performance metrics like packet delivery ratio, end–to–end delay, throughput and jitter by increasing number of nodes in the network. This comparative study proves that OLSR, ZRP performs well in dense networks in terms of low mobility and low traffic but in high mobility and high traffic environment ZRP performs well than OLSR and AODV. Keywords: MANET, AODV, OLSR, ZRP, routing
Analysis and design of high rise building frame using staad proeSAT Journals
Abstract The Aim of present study “Analysis and design of high rise building by staad pro 2008” is to define proper technique for creating Geometry, cross sections for column and beam etc, developing specification and supports conditions, types of Loads and load combinations. In this study a 30- storey high rise structure is analyzed for seismic and wind load combination using staad pro 2008 and comparison is drawn. Keywords: Analysis, Geometry, Structure, Wind load
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Addressing the cloud computing security menaceeSAT Journals
Abstract Cloud Computing is fast gaining popularity today with its scalable, flexible and on-demand service provision. It brings cost saving and agility to organization with pay-as-you-go approach. Abundant resources are available and the user has a huge range to select from. Cloud facilitates virtualization, simplification, automation and accelerated delivery of application and services for a sustainable business advantage. As much as the technological benefit, cloud computing also has security issues. Security in cloud computing is essential for providing quality of service. In this paper we address security issues which concern cloud computing environment today. We analyze Cloud Computing and security menace it faces due to different threats. Index Terms: Cloud Computing, Cloud Service Provider (CSP), Cloud Security, Cloud User, SaaS, PaaS, IaaS, StaaS
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Cloud Computing Basics Features and Servicesijtsrd
Cloud computing is an on demand service in which distributed resources, information, software and other devices are provided according to the client's requirement at specific time 1 . Cloud computing involves deploying groups of remote servers and software networks that allow centralized data storage and online access to computer services or resources. In this paper, we explore the different services in different computing platforms and applications. Cloud computing is a service, which offers customers to work over the internet 2 . Kyi Pyar | Me Me Khaing "Cloud Computing Basics: Features and Services" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd27960.pdfPaper URL: https://www.ijtsrd.com/computer-science/distributed-computing/27960/cloud-computing-basics-features-and-services/kyi-pyar
A brief review: security issues in cloud computing and their solutionsTELKOMNIKA JOURNAL
Cloud computing is an Internet-based, emerging technology, tends to be prevailing in our environment especially in the field of computer sciences and information technologies which require network computing on large scale. Cloud Computing is a shared pool of services which is gaining popularity due to its cost, effectiveness, avilability and great production. Along with its numerous benefits, cloud computing brings much more challenging situation regarding data privacy, data protection, authenticated access, Intellectual property rights etc. Due to these issues, adoption of cloud computing is becoming difficult in today’s world. In this review paper, various security issues regarding data privacy and reliability, key factors which are affecting cloud computing, have been addressed and also suggestions on particular areas have been discussed.
Comparison of data security in grid and cloud computingeSAT Journals
Abstract In the current era, Grid computing and cloud computing are the main fields in the research work. This thesis define which are the main security issues to be considered in cloud computing and grid computing, and how some of these security issues are solved. Comparative study shows the grid security is tighter than the cloud. It also shows cloud computing is less secure and faced security problems. This research work is based on main security problems in cloud computing such as authentication, authorization, access control and security infrastructure (SLA). Cloud infrastructure is based on service level agreement; simply cloud providers provide different services to cloud’s users and organizations with an agreement known SLA. So the security and privacy of user’s data is the main problem, because unauthorized person can’t access the data of cloud user. Hacking and data leakage are the common threats in cloud computing. As the security due to hackers increase over internet and the cloud computing is totally on internet. At this time, cloud computing demand the tight password protection and strong authentication and authorization procedure. For an increased level of security, privacy and password protection, we provide a new strong authentication model named “Two factor authentications using graphical password with pass point scheme”. This authentication model includes the login procedure, access control that is based on service level agreement (SLA) in cloud computing. Index Terms: Cloud computing, Authentication, login, Recognition, Recall, Pass point, security, Cloud Provider, Service level Agreement, Two Factor Authentication
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Abstract Beauty of Cloud Computing is its Simplicity. A lot of visions exist for Cloud computing terminology. Here is a re-collection of facts about cloud computing. Basic approach for understanding CC technology Interview of cloud technology as well as proposal for further empirical work in modeling cloud computing technologies Index Terms: Parameters; Models; Privacy; Maintenance; Protected cloud
Services, security challenges and security policies in cloud computingeSAT Journals
Abstract Cloud computing is becoming most emerging trend in IT industry. With its potential growth and lucrative services cloud computing has acquired mass market in the industry large enterprises running their business on the cloud. A greater acceptance of public cloud by various businesses has given it a wide popularity, strengthening of public cloud security is big milestone. The public cloud acceptance is increasing along with the trust in public cloud at large extent. As the security is most vital factor in the cloud. Handovering data to the cloud service provider keeps cloud user tensed. Different threats have been discovered in recent years. Database security in public cloud raised some critical issues for cloud service provider. This rapid adaptation to the clouds, have increased concerns on a critical issue for successive growth of communication technology and information security. From a cloud security perspective, a number of unexplored risks and challenges are faced by cloud because of migration, causing degradation of the effectiveness of traditional protection mechanisms. Keywords: Cloud computing, Cloud DBaaS, public cloud, Cloud Security, Confidentiality, Trust, Encryption.
Cloud computing is architecture for providing
computing service via the internet on demand and pay per use
access to a pool of shared resources namely networks, storage,
servers, services and applications, without physically acquiring
them. So it saves managing cost and time for organizations. The
market size the cloud computing shared is still far behind the one
expected. From the consumers’ perspective, cloud computing
security concerns, especially data security and privacy protection
issues, remain the primary inhibitor for adoption of cloud
computing services. The security for Cloud Computing is
emerging area for study and this paper provide security topic in
terms of cloud computing based on analysis of Cloud Security
treats and Technical Components of Cloud Computing
Load Balancing Tactics in Cloud Computing: A Systematic Study Raman Gill
Cloud computing has recently emerged as new paradigm in field of technology. Cloud computing is attractive to business owners and IT people. It is still in its infancy and many issues are to be addressed. This paper covers the cloud computing basics and discusses load balancing in cloud computing environment as the one of the major challenges of cloud computing. It also discusses the various existing load balancing algorithms.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Similar to A challenge for security and service level agreement in cloud computinge (20)
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
Abstract
The effect of addition of mono fibers and hybrid fibers on the mechanical properties of concrete mixture is studied in the present
investigation. Steel fibers of 1% and polypropylene fibers 0.036% were added individually to the concrete mixture as mono fibers and
then they were added together to form a hybrid fiber reinforced concrete. Mechanical properties such as compressive, split tensile and
flexural strength were determined. The results show that hybrid fibers improve the compressive strength marginally as compared to
mono fibers. Whereas, hybridization improves split tensile strength and flexural strength noticeably.
Keywords:-Hybridization, mono fibers, steel fiber, polypropylene fiber, Improvement in mechanical properties.
Material management in construction – a case studyeSAT Journals
Abstract
The objective of the present study is to understand about all the problems occurring in the company because of improper application
of material management. In construction project operation, often there is a project cost variance in terms of the material, equipments,
manpower, subcontractor, overhead cost, and general condition. Material is the main component in construction projects. Therefore,
if the material management is not properly managed it will create a project cost variance. Project cost can be controlled by taking
corrective actions towards the cost variance. Therefore a methodology is used to diagnose and evaluate the procurement process
involved in material management and launch a continuous improvement was developed and applied. A thorough study was carried
out along with study of cases, surveys and interviews to professionals involved in this area. As a result, a methodology for diagnosis
and improvement was proposed and tested in selected projects. The results obtained show that the main problem of procurement is
related to schedule delays and lack of specified quality for the project. To prevent this situation it is often necessary to dedicate
important resources like money, personnel, time, etc. To monitor and control the process. A great potential for improvement was
detected if state of the art technologies such as, electronic mail, electronic data interchange (EDI), and analysis were applied to the
procurement process. These helped to eliminate the root causes for many types of problems that were detected.
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
Abstract
Drought management needs multidisciplinary action. Interdisciplinary efforts among the experts in various fields of the droughts
prone areas are helpful to achieve tangible and permanent solution for this recurring problem. The Gulbarga district having the total
area around 16, 240 sq.km, and accounts 8.45 per cent of the Karnataka state area. The district has been situated with latitude 17º 19'
60" North and longitude of 76 º 49' 60" east. The district is situated entirely on the Deccan plateau positioned at a height of 300 to
750 m above MSL. Sub-tropical, semi-arid type is one among the drought prone districts of Karnataka State. The drought
management is very important for a district like Gulbarga. In this paper various short term strategies are discussed to mitigate the
drought condition in the district.
Keywords: Drought, South-West monsoon, Semi-Arid, Rainfall, Strategies etc.
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
Abstract
Pavements are subjected to severe condition of stresses and weathering effects from the day they are constructed and opened to traffic
mainly due to its fatigue behavior and environmental effects. Therefore, pavement rehabilitation is one of the most important
components of entire road systems. This paper highlights the design of concrete pavement with added mono fibers like polypropylene,
steel and hybrid fibres for a widened portion of existing concrete pavement and various overlay alternatives for an existing
bituminous pavement in an urban road in Bangalore. Along with this, Life cycle cost analyses at these sections are done by Net
Present Value (NPV) method to identify the most feasible option. The results show that though the initial cost of construction of
concrete overlay is high, over a period of time it prove to be better than the bituminous overlay considering the whole life cycle cost.
The economic analysis also indicates that, out of the three fibre options, hybrid reinforced concrete would be economical without
compromising the performance of the pavement.
Keywords: - Fatigue, Life cycle cost analysis, Net Present Value method, Overlay, Rehabilitation
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
Abstract
The issue of growing demand on our nation’s roadways over that past couple of decades, decreasing budgetary funds, and the need to
provide a safe, efficient, and cost effective roadway system has led to a dramatic increase in the need to rehabilitate our existing
pavements and the issue of building sustainable road infrastructure in India. With these emergency of the mentioned needs and this
are today’s burning issue and has become the purpose of the study.
In the present study, the samples of existing bituminous layer materials were collected from NH-48(Devahalli to Hassan) site.The
mixtures were designed by Marshall Method as per Asphalt institute (MS-II) at 20% and 30% Reclaimed Asphalt Pavement (RAP).
RAP material was blended with virgin aggregate such that all specimens tested for the, Dense Bituminous Macadam-II (DBM-II)
gradation as per Ministry of Roads, Transport, and Highways (MoRT&H) and cost analysis were carried out to know the economics.
Laboratory results and analysis showed the use of recycled materials showed significant variability in Marshall Stability, and the
variability increased with the increase in RAP content. The saving can be realized from utilization of recycled materials as per the
methodology, the reduction in the total cost is 19%, 30%, comparing with the virgin mixes.
Keywords: Reclaimed Asphalt Pavement, Marshall Stability, MS-II, Dense Bituminous Macadam-II
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
Abstract
Soil stabilization has proven to be one of the oldest techniques to improve the soil properties. Literature review conducted revealed
that uses of natural inorganic stabilizers are found to be one of the best options for soil stabilization. In this regard an attempt has
been made to evaluate the influence of RBI-81 stabilizer on properties of black cotton soil through laboratory investigations. Black
cotton soil with varying percentages of RBI-81 viz., 0, 0.5, 1, 1.5, 2, and 2.5 percent were studied for moisture density relationships
and strength behaviour of soils. Also the effect of curing period was evaluated as literature review clearly emphasized the strength
gain of soils stabilized with RBI-81 over a period of time. The results obtained shows that the unconfined compressive strength of
specimens treated with RBI-81 increased approximately by 250% for a curing period of 28 days as compared to virgin soil. Further
the CBR value improved approximately by 400%. The studies indicated an increasing trend for soil strength behaviour with
increasing percentage of RBI-81 suggesting its potential applications in soil stabilization.
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
Abstract
Reinforced masonry was developed to exploit the strength potential of masonry and to solve its lack of tensile strength. Experimental
and analytical studies have been carried out to investigate the effect of reinforcement on the behavior of hollow concrete block
masonry prisms under compression and to predict ultimate failure compressive strength. In the numerical program, three dimensional
non-linear finite elements (FE) model based on the micro-modeling approach is developed for both unreinforced and reinforced
masonry prisms using ANSYS (14.5). The proposed FE model uses multi-linear stress-strain relationships to model the non-linear
behavior of hollow concrete block, mortar, and grout. Willam-Warnke’s five parameter failure theory has been adopted to model the
failure of masonry materials. The comparison of the numerical and experimental results indicates that the FE models can successfully
capture the highly nonlinear behavior of the physical specimens and accurately predict their strength and failure mechanisms.
Keywords: Structural masonry, Hollow concrete block prism, grout, Compression failure, Finite element method,
Numerical modeling.
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
Abstract
Increase in traffic along with heavier magnitude of wheel loads cause rapid deterioration in pavements. There is a need to improve
density, strength of soil subgrade and other pavement layers. In this study an attempt is made to improve the properties of locally
available loamy soil using twin approaches viz., i) increasing the compaction of soil and ii) treating the soil with chemical stabilizer.
Laboratory studies are carried out on both untreated and treated soil samples compacted by different compaction efforts. Studies
show that increase in compaction effort results in increase in density of soil. However in soil treated with chemical stabilizer, rate of
increase in density is not significant. The soil treated with chemical stabilizer exhibits improvement in both strength and performance
properties.
Keywords: compaction, density, subgradestabilization, resilient modulus
Geographical information system (gis) for water resources managementeSAT Journals
Abstract
Water resources projects are inherited with overlapping and at times conflicting objectives. These projects are often of varied sizes
ranging from major projects with command areas of millions of hectares to very small projects implemented at the local level. Thus,
in all these projects there is seldom proper coordination which is essential for ensuring collective sustainability.
Integrated watershed development and management is the accepted answer but in turn requires a comprehensive framework that can
enable planning process involving all the stakeholders at different levels and scales is compulsory. Such a unified hydrological
framework is essential to evaluate the cause and effect of all the proposed actions within the drainage basins.
The present paper describes a hydrological framework developed in the form of a Hydrologic Information System (HIS) which is
intended to meet the specific information needs of the various line departments of a typical State connected with water related aspects.
The HIS consist of a hydrologic information database coupled with tools for collating primary and secondary data and tools for
analyzing and visualizing the data and information. The HIS also incorporates hydrological model base for indirect assessment of
various entities of water balance in space and time. The framework would be maintained and updated to reflect fully the most
accurate ground truth data and the infrastructure requirements for planning and management.
Keywords: Hydrological Information System (HIS); WebGIS; Data Model; Web Mapping Services
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
Abstract
The study demonstrate the potentiality of satellite remote sensing technique for the generation of baseline information on forest types
including tree plantation details in Bidar forest division, Karnataka covering an area of 5814.60Sq.Kms. The Total Area of Bidar
forest division is 5814Sq.Kms analysis of the satellite data in the study area reveals that about 84% of the total area is Covered by
crop land, 1.778% of the area is covered by dry deciduous forest, 1.38 % of mixed plantation, which is very threatening to the
environmental stability of the forest, future plantation site has been mapped. With the use of latest Geo-informatics technology proper
and exact condition of the trees can be observed and necessary precautions can be taken for future plantation works in an appropriate
manner
Keywords:-RS, GIS, GPS, Forest Type, Tree Plantation
Factors influencing compressive strength of geopolymer concreteeSAT Journals
Abstract
To study effects of several factors on the properties of fly ash based geopolymer concrete on the compressive strength and also the
cost comparison with the normal concrete. The test variables were molarities of sodium hydroxide(NaOH) 8M,14M and 16M, ratio of
NaOH to sodium silicate (Na2SiO3) 1, 1.5, 2 and 2.5, alkaline liquid to fly ash ratio 0.35 and 0.40 and replacement of water in
Na2SiO3 solution by 10%, 20% and 30% were used in the present study. The test results indicated that the highest compressive
strength 54 MPa was observed for 16M of NaOH, ratio of NaOH to Na2SiO3 2.5 and alkaline liquid to fly ash ratio of 0.35. Lowest
compressive strength of 27 MPa was observed for 8M of NaOH, ratio of NaOH to Na2SiO3 is 1 and alkaline liquid to fly ash ratio of
0.40. Alkaline liquid to fly ash ratio of 0.35, water replacement of 10% and 30% for 8 and 16 molarity of NaOH and has resulted in
compressive strength of 36 MPa and 20 MPa respectively. Superplasticiser dosage of 2 % by weight of fly ash has given higher
strength in all cases.
Keywords: compressive strength, alkaline liquid, fly ash
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
Abstract
Composite Circular hollow Steel tubes with and without GFRP infill for three different grades of Light weight concrete are tested for
ultimate load capacity and axial shortening , under Cyclic loading. Steel tubes are compared for different lengths, cross sections and
thickness. Specimens were tested separately after adopting Taguchi’s L9 (Latin Squares) Orthogonal array in order to save the initial
experimental cost on number of specimens and experimental duration. Analysis was carried out using ANN (Artificial Neural
Network) technique with the assistance of Mini Tab- a statistical soft tool. Comparison for predicted, experimental & ANN output is
obtained from linear regression plots. From this research study, it can be concluded that *Cross sectional area of steel tube has most
significant effect on ultimate load carrying capacity, *as length of steel tube increased- load carrying capacity decreased & *ANN
modeling predicted acceptable results. Thus ANN tool can be utilized for predicting ultimate load carrying capacity for composite
columns.
Keywords: Light weight concrete, GFRP, Artificial Neural Network, Linear Regression, Back propagation, orthogonal
Array, Latin Squares
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
Abstract
This paper presents an outlook on experimental behavior and a comparison with predicted formula on the behaviour of circular
concentrically loaded self-consolidating fibre reinforced concrete filled steel tube columns (HSSCFRC). Forty-five specimens were
tested. The main parameters varied in the tests are: (1) percentage of fiber (2) tube diameter or width to wall thickness ratio (D/t
from 15 to 25) (3) L/d ratio from 2.97 to 7.04 the results from these predictions were compared with the experimental data. The
experimental results) were also validated in this study.
Keywords: Self-compacting concrete; Concrete-filled steel tube; axial load behavior; Ultimate capacity.
Evaluation of punching shear in flat slabseSAT Journals
Abstract
Flat-slab construction has been widely used in construction today because of many advantages that it offers. The basic philosophy in
the design of flat slab is to consider only gravity forces; this method ignores the effect of punching shear due to unbalanced moments
at the slab column junction which is critical. An attempt has been made to generate generalized design sheets which accounts both
punching shear due to gravity loads and unbalanced moments for cases (a) interior column; (b) edge column (bending perpendicular
to shorter edge); (c) edge column (bending parallel to shorter edge); (d) corner column. These design sheets are prepared as per
codal provisions of IS 456-2000. These design sheets will be helpful in calculating the shear reinforcement to be provided at the
critical section which is ignored in many design offices. Apart from its usefulness in evaluating punching shear and the necessary
shear reinforcement, the design sheets developed will enable the designer to fix the depth of flat slab during the initial phase of the
design.
Keywords: Flat slabs, punching shear, unbalanced moment.
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
Abstract
Intake towers are typically tall, hollow, reinforced concrete structures and form entrance to reservoir outlet works. A parametric
study on dynamic behavior of circular cylindrical towers can be carried out to study the effect of depth of submergence, wall thickness
and slenderness ratio, and also effect on tower considering dynamic analysis for time history function of different soil condition and
by Goyal and Chopra accounting interaction effects of added hydrodynamic mass of surrounding and inside water in intake tower of
dam
Key words: Hydrodynamic mass, Depth of submergence, Reservoir, Time history analysis,
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
Abstract
Efficiency of the road network system is analyzed by travel time reliability measures. The study overlooks on an important measure of
travel time reliability and prioritizing Tiruchirappalli road network. Traffic volume and travel time were collected using license plate
matching method. Travel time measures were estimated from average travel time and 95th travel time. Effect of non-motorized vehicle
on efficiency of road system was evaluated. Relation between buffer time index and traffic volume was created. Travel time model has
been developed and travel time measure was validated. Then service quality of road sections in network were graded based on
travel time reliability measures.
Keywords: Buffer Time Index (BTI); Average Travel Time (ATT); Travel Time Reliability (TTR); Buffer Time (BT).
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
Abstract
The development of watershed aims at productive utilization of all the available natural resources in the entire area extending from
ridge line to stream outlet. The per capita availability of land for cultivation has been decreasing over the years. Therefore, water and
the related land resources must be developed, utilized and managed in an integrated and comprehensive manner. Remote sensing and
GIS techniques are being increasingly used for planning, management and development of natural resources. The study area, Nallur
Amanikere watershed geographically lies between 110 38’ and 110 52’ N latitude and 760 30’ and 760 50’ E longitude with an area of
415.68 Sq. km. The thematic layers such as land use/land cover and soil maps were derived from remotely sensed data and overlayed
through ArcGIS software to assign the curve number on polygon wise. The daily rainfall data of six rain gauge stations in and around
the watershed (2001-2011) was used to estimate the daily runoff from the watershed using Soil Conservation Service - Curve Number
(SCS-CN) method. The runoff estimated from the SCS-CN model was then used to know the variation of runoff potential with different
land use/land cover and with different soil conditions.
Keywords: Watershed, Nallur watershed, Surface runoff, Rainfall-Runoff, SCS-CN, Remote Sensing, GIS.
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
Abstract
Land and water are the two vital natural resources, the optimal management of these resources with minimum adverse environmental
impact are essential not only for sustainable development but also for human survival. Satellite remote sensing with geographic
information system has a pragmatic approach to map and generate spatial input layers of predicting response behavior and yield of
watershed. Hence, in the present study an attempt has been made to understand the hydrological process of the catchment at the
watershed level by drawing the inferences from moprhometric analysis and runoff. The study area chosen for the present study is
Yagachi catchment situated in Chickamaglur and Hassan district lies geographically at a longitude 75⁰52’08.77”E and
13⁰10’50.77”N latitude. It covers an area of 559.493 Sq.km. Morphometric analysis is carried out to estimate morphometric
parameters at Micro-watershed to understand the hydrological response of the catchment at the Micro-watershed level. Daily runoff
is estimated using USDA SCS curve number model for a period of 10 years from 2001 to 2010. The rainfall runoff relationship of the
study shows there is a positive correlation.
Keywords: morphometric analysis, runoff, remote sensing and GIS, SCS - method
-
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
Abstract The nonlinear Static procedure also well known as pushover analysis is method where in monotonically increasing loads are applied to the structure till the structure is unable to resist any further load. It is a popular tool for seismic performance evaluation of existing and new structures. In literature lot of research has been carried out on conventional pushover analysis and after knowing deficiency efforts have been made to improve it. But actual test results to verify the analytically obtained pushover results are rarely available. It has been found that some amount of variation is always expected to exist in seismic demand prediction of pushover analysis. Initial study is carried out by considering user defined hinge properties and default hinge length. Attempt is being made to assess the variation of pushover analysis results by considering user defined hinge properties and various hinge length formulations available in literature and results compared with experimentally obtained results based on test carried out on a G+2 storied RCC framed structure. For the present study two geometric models viz bare frame and rigid frame model is considered and it is found that the results of pushover analysis are very sensitive to geometric model and hinge length adopted. Keywords: Pushover analysis, Base shear, Displacement, hinge length, moment curvature analysis
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
Abstract
Depletion of natural resources and aggregate quarries for the road construction is a serious problem to procure materials. Hence
recycling or reuse of material is beneficial. On emphasizing development in sustainable construction in the present era, recycling of
asphalt pavements is one of the effective and proven rehabilitation processes. For the laboratory investigations reclaimed asphalt
pavement (RAP) from NH-4 and crumb rubber modified binder (CRMB-55) was used. Foundry waste was used as a replacement to
conventional filler. Laboratory tests were conducted on asphalt concrete mixes with 30, 40, 50, and 60 percent replacement with RAP.
These test results were compared with conventional mixes and asphalt concrete mixes with complete binder extracted RAP
aggregates. Mix design was carried out by Marshall Method. The Marshall Tests indicated highest stability values for asphalt
concrete (AC) mixes with 60% RAP. The optimum binder content (OBC) decreased with increased in RAP in AC mixes. The Indirect
Tensile Strength (ITS) for AC mixes with RAP also was found to be higher when compared to conventional AC mixes at 300C.
Keywords: Reclaimed asphalt pavement, Foundry waste, Recycling, Marshall Stability, Indirect tensile strength.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
A challenge for security and service level agreement in cloud computinge
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 28
A CHALLENGE FOR SECURITY AND SERVICE LEVEL AGREEMENT
IN CLOUD COMPUTINGE
R. Chawngsangpuii1
, Rohit Kumar Das2
, Vanlalhruaia3
1
Senior Asst. Professor, Department of Information Technology, Mizoram University, Mizoram, India
2
Lecturer, Department of Information Technology, Mizoram University, Mizoram, India
3
Assistant Professor, Department of Information Technology, Mizoram University, Mizoram, India
Abstract
One of the most promising field in computing is regarded as cloud computing, which allows users to store their data virtually over
the cloud without the need of any fixed infrastructure. It offer user to manipulate their data regardless of the geographical
position, hence providing a scalable, feasible and flexible way to connect user to their data. The cloud can be considered as of the
Internet where data are usually stored and computing refers to the applications and services that it can provide. Users are
connected to cloud by Cloud Service Providers through the Internet connection. Both users and cloud service provider agree on a
protocol known as service level agreements for exchange of information. Cloud computing provides increase in capacity and
grants the capability to perform computation on cloud infrastructure to its users. Cloud Computing is capable of providing more
convenient communication and instant multi-point collaboration feature. Cloud computing provides better utilization of
distributed resource over large amount of data and they can be access remotely through the internet. Quality of service should be
kept in mind will designing the service level agreement. There are many problem related to cloud computing such as traffic
managements, security and privacy. This paper provides a survey on the basic working principle of clouding computing. This
paper provides an overview of the cloud architecture including the different types and level of clouds services. In this paper focus
has been made upon the service level agreement, issue and security prospectus over the cloud computing.
Keywords: Architecture, Cloud Computing, Cloud Security, Cloud Services Service Level Agreements
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
Storing user data in clouds where clouds acts as a virtual
storage system is term as cloud computing and is an
emerging field in relation to computing. The basic idea is
that if a user wants to store data over the cloud, user simply
send data files over the internet that are stored in data server
through a web interface and when wants the data back from
the server, user need to send request to the server. The
server then sends back the data in which the user can
manipulate and update the data. Data centre acts as a house
for cloud storage system capable of storing different kind
and amount of data.
Infrastructure, platform, software and other resources are
providing scalable, feasible and flexible access to clouds for
the users to virtually store their data. In cloud computing,
network resources like servers, storage applications and
services are performing as opportune assets to the user for
meeting the demand of storage for cloud data. The
merchants that are providing access to cloud are known as
Cloud Service Providers (CSPs) [1]. Service Level
Agreements (SLA) is an agreement between the service
provider and their customer who agrees on the terms and
condition specified in the SLA and is been described in
detail later in the paper.
The primary types of cloud that CSPs want to provide to
their customer can be of three types:
Public Cloud: Large industrial group or the general
public use this type of cloud and hence the name
public cloud. This type of cloud are generally own
and handle by the CSPs itself but the security
intensity is quit stumpy where as the advantage is that
the resources are provided by the CSPs so the set-up
is inexpensive and easy to use. Examples of public
clouds include Amazon Elastic Compute Cloud
(EC2), IBM's Blue Cloud, Sun Cloud, Google
AppEngine and Windows Azure Services Platform.
Private Cloud: A private cloud is own and managed
by the organization it serves. This type of cloud
provides more control over the data that are stored
within the cloud, and it ensures high security level on
compare to public cloud, even though with greater
potential risk for data loss due to natural disaster.
Amazon's Elastic Compute Cloud (EC2) or Simple
Storage Service (S3) is the third-party host that can
provide this service.
Hybrid Cloud: As the name suggest, hybrid cloud
are those which forms from the combination of public
and private cloud and takes the advantages like
stability, reliability, cost saving aspects from public
cloud system and maintainers and security aspects
from private cloud systems.
Cloud computing is regarded as one of the immerging topic
in the field of computing. The cost effectiveness, scalability
and reliability make it more attractive to use. Lots of issues
and challenges have been resolved. But how far it is secure
is still the prime question.
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 29
Fig -1: Different types of Clouds providing by CSPs
2. RELATED WORK
The authors of [4] relate the issue regarding the security and
privacy to the user data. Data resiliency and reliability of
server have also been considered as cloud server can also go
downfall. The vulnerabilities of virtualization in cloud
computing infrastructure are described by the authors of [5].
The authors of [6] have provided some of security, cost
effectiveness and virtualization survey and the current
methods addressing them. The aspects of security,
comparison of trust/reputation models and privacy-
preservation schemes are described by the authors of [7].
3. ARCHITECTURE OF CLOUD COMPUTING
Cloud computing architecture consists of two parts: Front-
end (Users) and Back-end (Clouds). Users are connected to
cloud through Internet. The Internet acts as a middleware
and the connection of Internet can be of point-to-point or
peer-to-peer connection depending upon the type of cloud
they want to access. Front-end consists of users and the
application like web browser whereas the back-end consists
of cloud services like providing virtual servers, data storage
system, etc [2].
Fig -2: Conceptual diagram of cloud computing
There are certain layers which connects the user to server.
These are Application layer, Platform layer and
Infrastructure layer as shown in the figure below:
Fig -3: Cloud computing Architectural diagram
Each of the layers can be illustrate as:
Software as a Service (SaaS): It forms the topmost
layer where with SaaS, everything is provided as an
application or service to the clients who eliminate the
need for installation of software or application
services in the client side; the only thing is that the
client needs to purchase the ability to access them as
define in SLA. Standard examples for this are
Salesforce.com and Hotmail which are web browser
based services.
Platform as a Service (PaaS): It acts as middle layer
where with PaaS, using the cloud infrastructure like
operating system or software framework computing
platform is provided to the clients. Standard example
for PaaS can include Windows Azure and Google
Apps.
Infrastructure as a Service (IaaS): It is the
bottommost layer and the function is to grant the
infrastructure based services virtually to the clients
that include hardware for storing client data and the
network resources, etc for which charges are applied
only when the clients are access to those virtual
resources, hence making the task cost economical and
prompt. Standard example includes GoGrid and
Google cloud storage.
4. SERVICE LEVEL AGREEMENT
Service Level Agreement (SLA) is a documenting process
which includes some protocol and is sited between the client
and cloud service provider (CSPs). Services to the clients
are provided based upon the agreements which are agreed
by both client and CSPs. SLA can be of both informal
contract of legal contract between two parties [8].
The objectives of SLA Agreement are to:
Provide clear reference to service ownership,
accountability, roles and responsibilities.
Provide a mechanism for review and change to the
service levels over the course of the contract.
Present a clear, concise and measurable description of
service provision to the customer.
Match perceptions of expected service provision with
actual service support & delivery.
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 30
Provide an ongoing reporting mechanism for
measuring the expected performance standards
Service Level Agreement can be divided based on different
levels:
Service-based SLA: Based on the agreement, the
service provider provides services to all the
customers
Customer-based SLA: Based on the agreement,
services are provided with an individual customer
groups.
Multi-level SLA: The SLA is split into the different
levels, each addressing different set of customers for
the same services, in the same SLA.
5. SECURITY ISSUE RELATED TO CLOUD
COMPUTING
As with advancement of technology, it comes with
disadvantage also. Till date there are lots of issue which has
been taken care. Despite the consequences, Security is
regarded as one of major issue which need more attention
from both the cloud providers and their customer’s point of
view. Cloud Service Providers (CSPs) furnish different
security level to all the services it provides [3] [5].
The following are some of the important aspects related to
security measures:
Restriction to user access: As the data are moving
out from the clients to the cloud, the level of risk
increase in terms of management, multiple
placements etc. The enterprise client may want to
store huge amount of data in cloud. After storing
those data, the enterprise client possibly will want to
manipulate that data. Now, multiple accesses to those
may create problem in handling those data for the
CSP as well. Therefore, access to those valuable data
must be restricted to some of the user only.
Malicious attack to client’s data: The third party
attack to the client data from a former employee or a
business partner can cause harm. The passive attacker
can have increasing levels of access to more critical
systems and eventually to data.
Isolation of client’s data: CSP store their client data
in alongside manner. Data integrity is one of the
major concerns. CSP ensures that the client data are
well maintained. But as multiple data are stored in a
shared cloud, there is a possibility of getting data
conflict though CSP provided proper encryption.
Long-term viability of client’s data: Ideally, the
CSPs will never go broke or get acquired and
swallowed up by a larger company. But the client
must be sure that data will remain available even after
such an event.
Shared technology vulnerabilities to client’s data: To
provide a scalable way to access data, CSPs share
infrastructure, platforms, and applications. The shared
infrastructure may include CPU caches or GPUs which are
not specifically designed for multi inhabitant architecture
(IaaS), re-deployable platforms (PaaS), or multi-customer
applications (SaaS), the threat of shared vulnerabilities
exists in all delivery models.
6. CONCLUSION
Cloud computing is an emerging paradigm which provide a
feasible way to store data virtually over the internet without
the need of any physical infrastructure. The service level
agreement plays an important role in cloud computing for
which it has been included in this paper. One of the major
issue or challenge is refer to be the security meadow as in
cloud computing system is shared between many users for
which crucial measures are needed to protect the client data.
REFERENCES
[1]. Abdulelah Almishal and Ahmed E. Youssef, “Cloud
Service Providers: A Comparative Study”, International
Journal of Computer Applications & Information
Technology Vol. 5, Issue II, ISSN: 2278-7720, 2014
[2]. W. Tsai, X. Sun, J. Balasooriya, “Service-Oriented
Cloud Computing Architecture”, 7th IEEE International
Conference on Information Technology, 2010
[3]. Dinadayalan, P., S. Jegadeeswari, and D. Gnanambigai,
“Data Security Issues in Cloud Environment and Solutions”,
Computing and Communication Technologies (WCCCT),
2014 World Congress on. IEEE, 2014
[4]. Yashpalsinh Jadeja and Kirit Modi, “Cloud Computing
- Concepts, Architecture and Challenges”, International
Conference on Computing, Electronics and Electrical
Technologies [ICCEET], 2012
[5]. P.Purniemaa, R. Jagadeesh Kannan and N.Jaisankar,
“Security Threat and Attack in Cloud Infrastructure: A
Survey”, The International Journal of Computer Science &
Applications (TIJCSA) ISSN – 2278-1080, Vol. 2 No. 06,
2013
[6]. Nandini Mishra , Kanchan khushwha, Ritu chasta and
Er. Abhishek Choudhary, “Technologies of Cloud
Computing – Architecture Concepts based on Security and
its Challenges”, International Journal of Advanced Research
in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 3, ISSN: 2278 – 1323, 2013
[7]. Fei Hu, Meikang Qiu, Jiayin Li, Travis Grant, Draw
Tylor, Seth McCaleb, Lee Butler and Richard Hamner, “A
Review on Cloud Computing: Design Challenges in
Architecture and Security”, Journal of Computing and
Information Technology - CIT 19, 2011
[8]. Patel, Pankesh, Ajith H. Ranabahu, and Amit P. Sheth,
“Service level agreement in cloud computing”, 2009
BIOGRAPHIES
R. Chawngsangpuii received her M.Sc
degree in Computer Science from
Bharathiar University, Coimbatore, India.
Her interest for area of research work is in
Cloud Computing and Grid Computing.
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 31
Rohit Kumar Das received his M.Tech
degree in Information Technology from
Assam University, Silchar, India. His
interest for area of research work is in
Network Security and Wireless Networking.
Vanlalhruaia received his M.Tech degree in
Information Technology from Tezpur
University, Tezpur, India. His interest for
area of research work is in Cloud
Computing and Network Security