Abstract Cloud computing is a new computing paradigm that brought a lot of advantages especially in ubiquitous services where everybody can access computer services through internet With cloud computing, there is no need of physical hardware or servers that will support the company’s computer system, internet services and networks. Cloud computing technology is a new concept of providing dramatically scalable and virtualized resources, bandwidth, software and hardware on demand to consumers. Consumers can typically requests cloud services via a web browser or web service. Using cloud computing, consumers can safe cost of hardware deployment, software licenses and system maintenance. On the other hand, it also has a few security issues. This paper introduces cloud security problems. The data in cloud need to secure from all types of security attacks. Another core services provided by cloud computing is data storages. Keywords— Cloud Computing, Security and Countermeasures, Consumers, XML Signature Element Wrapping, Browser Security, Cyber Laws, policy, Data Privacy.
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSIJNSA Journal
Cloud computing is a new innovative model for enterprise in which information is permanently stored on the servers and also manage how and when different resources are allocate to the requested users. It provides distributed approach through which resources are allocated dynamically to the users without investing in the infrastructure or licensing the software’s on the client side. Using the cloud makes processing of information is more commodious but it also present them with new security problems about reliability.This phenomenon introduces serious problems regarding access mechanism to any information stored in the database and resources in the cloud. For the successful implementation of cloud computing it is necessary that we must know different areas where the security is needed. For this there should also governess strategy needed for secure communication between multi-clouds located in different geographical areas or in different countries. In this paper we discuss how to safely utilizing the benefit of cloud computing through the network where data security, provide authentication, integration, recovery, IP spoofing and Virtual Servers are the most captiousfields in the cloud.
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environmentsmlaij
Incredible and amazing growths in the meadow of extranet, internet, intranet and its users have developed an innovative period of great global competition and contention. Denial of service attack by several computers is accomplished of distressing the services of competitor servers. The attack can be done for various reasons. So it is a key threat for cloud environment. Distributed-Denial of Service (DDoS) is a key intimidation to network and cloud computing security. Cloud computing Network is a group of nodes that interrelate with each other for switch over the information. So security is the major issue. There are several security attacks in cloud computing. One of the major intimidations to internet examine is DDoS attack. It is a malevolent effort to suspending or suspends services to destination node. DDoS or DoS is an effort to create network resource or the machine is busy to its intentional user. Numerous thoughts are developed for avoid the DDoS or DoS. DDoS occur in two different behaviours they may happen obviously or it may due to some attackers.
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSIJNSA Journal
Cloud computing is a new innovative model for enterprise in which information is permanently stored on the servers and also manage how and when different resources are allocate to the requested users. It provides distributed approach through which resources are allocated dynamically to the users without investing in the infrastructure or licensing the software’s on the client side. Using the cloud makes processing of information is more commodious but it also present them with new security problems about reliability.This phenomenon introduces serious problems regarding access mechanism to any information stored in the database and resources in the cloud. For the successful implementation of cloud computing it is necessary that we must know different areas where the security is needed. For this there should also governess strategy needed for secure communication between multi-clouds located in different geographical areas or in different countries. In this paper we discuss how to safely utilizing the benefit of cloud computing through the network where data security, provide authentication, integration, recovery, IP spoofing and Virtual Servers are the most captiousfields in the cloud.
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environmentsmlaij
Incredible and amazing growths in the meadow of extranet, internet, intranet and its users have developed an innovative period of great global competition and contention. Denial of service attack by several computers is accomplished of distressing the services of competitor servers. The attack can be done for various reasons. So it is a key threat for cloud environment. Distributed-Denial of Service (DDoS) is a key intimidation to network and cloud computing security. Cloud computing Network is a group of nodes that interrelate with each other for switch over the information. So security is the major issue. There are several security attacks in cloud computing. One of the major intimidations to internet examine is DDoS attack. It is a malevolent effort to suspending or suspends services to destination node. DDoS or DoS is an effort to create network resource or the machine is busy to its intentional user. Numerous thoughts are developed for avoid the DDoS or DoS. DDoS occur in two different behaviours they may happen obviously or it may due to some attackers.
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
Cloud computing is a model for enabling convenient, on-demand network access
to a shared pool of configurable computing resources. Reliability in compute cloud is an
important aspect in Quality of Service which needs to be addressed in order to foster the
adoption of compute cloud. In today’s integrated environment the distributed systems is
employed to carry out computational intensive task at a faster rate without much
investment. The Cloud is a multitenant architecture which allows faster computation with
high scalability at a lower cost thereby the users can share the same physical infrastructure.
Individual customers deploy their applications in such environment will occupy the virtual
partitions on the platform. This paper describes a straightforward procedure to analyze the
reliability of the application from the view point of the resource provider. A trust
component is implemented to provide preventive control and to mitigate the occurrence of
any non-permissible action by using the detective mechanism. Such mechanisms are used to
identify the privacy risk and it further prevents from utilization. Hence, in this paper trust
assessment is performed before the user is allowed to share the multitenant infrastructure.
The cloud can provide scalable and reliable service for the legitimate users. The proposed
work is tested using tools Aneka and Globus Toolkit.
Cloud computing challenges and solutionsIJCNCJournal
Cloud computing is an emerging area of computer technology that benefits form the processing power and
the computing resources of many connected, geographically distanced computers connected via Internet.
Cloud computing eliminates the need of having a complete infrastructure of hardware and software to meet
users requirements and applications. It can be thought of or considered as a complete or a partial
outsourcing of hardware and software resources. To access cloud applications, a good Internet connection
and a standard Internet browser are required. Cloud computing has its own drawback from the security
point of view; this paper aims to address most of these threats and their possible solutions.
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
Abstract Data security and Access control is a challenging research work in Cloud Computing. Cloud service users upload there private and confidential data over the cloud. As the data is transferred among the server and client, the data is to be protected from unauthorized entries into the server, by authenticating the user’s and provide high secure priority to the data. So the Experts always recommend using different passwords for different logins. Any normal person cannot possibly follow that advice and memorize all their usernames and passwords. That is where password managers come in. The purpose of this paper is to secure data from unauthorized person using Security blanket algorithm.
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Cloud computing is a new term to provide application and hardware as service over the internet. Demand for cloud has increased dramatically in recent years. However, a major drawback for cloud adoption is lack of security so that we will try to solve some security issues related to cloud storage by design and implement a secure system to store privet data in cloud storage. This secure system provide secure login to cloud by using third parity authentication (smart phone) and one time password depend on chaotic system to prevent unauthorized people from get access to cloud and modified AES algorithms to encrypt the data in the cloud storage.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A survey on cloud security issues and techniquesijcsa
Today, cloud computing is an emerging way of computing in computer science. Cloud computing is a set of
resources and services that are offered by the network or internet. Cloud computing extends various
computing techniques like grid computing, distributed computing. Today cloud computing is used in both
industrial field and academic field. Cloud facilitates its users by providing virtual resources via internet. As
the field of cloud computing is spreading the new techniques are developing. This increase in cloud
computing environment also increases security challenges for cloud developers. Users of cloud save their
data in the cloud hence the lack of security in cloud can lose the user’s trust.
In this paper we will discuss some of the cloud security issues in various aspects like multi-tenancy,
elasticity, availability etc. the paper also discuss existing security techniques and approaches for a secure
cloud. This paper will enable researchers and professionals to know about different security threats and
models and tools proposed.
Cloud computing security through symmetric cipher modelijcsit
Cloud computing can be defined as an application and services which runs on distributed network using
virtualized and it is accessed through internet protocols and networking. Cloud computing resources and
virtual and limitless and information’s of the physical systems on which software running are abstracted
from the user. Cloud Computing is a style of computing in which dynamically scalable and often virtualized
resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or
control over the technology infrastructure in the "cloud" that supports them. To satisfy the needs of the
users the concept is to incorporate technologies which have the common theme of reliance on the internet
Software and data are stored on the servers whereas cloud computing services are provided through
applications online which can be accessed from web browsers. Lack of security and access control is the
major drawback in the cloud computing as the users deal with sensitive data to public clouds .Multiple
virtual machine in cloud can access insecure information flows as service provider; therefore to implement
the cloud it is necessary to build security. Therefore the main aim of this paper is to provide cloud
computing security through symmetric cipher model. This article proposes symmetric cipher model in
order to implement cloud computing security so that data can accessed and stored securely.
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
Resource pooling on internet-based accessing on use as pay environmental technology and ruled in IT field is the
cloud. Present, in every organization has trusted the web, however, the information must flow but not hold the
data. Therefore, all customers have to use the cloud. While the cloud progressing info by securing-protocols. Third
party observing and certain circumstances directly stale in flow and kept of packets in the virtual private cloud.
Global security statistics in the year 2017, hacking sensitive information in cloud approximately maybe 75.35%,
and the world security analyzer said this calculation maybe reached to 100%. For this cause, this proposed
research work concentrates on Authentication-Message-Digest-Key with authentication in routing the Network as
a Service of packets in OSPF (Open Shortest Path First) implementing Cloud with GNS3 has tested them to
securing from attackers.
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTSijujournal
In computer networks attacks plays a vital role. It also degrades a cloud services nowadays. The attacks
reduce the quality of services in the computer networks as well as cloud platforms. The attack that makes
services engaged to the intended users. For effective use of cloud computing we need to reduce the attacks
vulnerabilities and improve the security. This study discuss about the different types of attacks that affects
the cloud environments and also possible mitigation techniques to reduce the attacks. Issue mitigation
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTSijujournal
In computer networks attacks plays a vital role. It also degrades a cloud services nowadays. The attacks
reduce the quality of services in the computer networks as well as cloud platforms. The attack that makes
services engaged to the intended users. For effective use of cloud computing we need to reduce the attacks
vulnerabilities and improve the security. This study discuss about the different types of attacks that affects
the cloud environments and also possible mitigation techniques to reduce the attacks. Issue mitigation
In this paper we are study-ing about cloud computing, their types, need to use cloud computing. We also study the architecture of the mobile cloud computing. So we included new techniques for backup and restoring data from mobile to cloud. Here we proposed to apply some compres-sion technique while backup and restore data from Smartphone to cloud and cloud to the Smartphone.
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
Cloud computing is a model for enabling convenient, on-demand network access
to a shared pool of configurable computing resources. Reliability in compute cloud is an
important aspect in Quality of Service which needs to be addressed in order to foster the
adoption of compute cloud. In today’s integrated environment the distributed systems is
employed to carry out computational intensive task at a faster rate without much
investment. The Cloud is a multitenant architecture which allows faster computation with
high scalability at a lower cost thereby the users can share the same physical infrastructure.
Individual customers deploy their applications in such environment will occupy the virtual
partitions on the platform. This paper describes a straightforward procedure to analyze the
reliability of the application from the view point of the resource provider. A trust
component is implemented to provide preventive control and to mitigate the occurrence of
any non-permissible action by using the detective mechanism. Such mechanisms are used to
identify the privacy risk and it further prevents from utilization. Hence, in this paper trust
assessment is performed before the user is allowed to share the multitenant infrastructure.
The cloud can provide scalable and reliable service for the legitimate users. The proposed
work is tested using tools Aneka and Globus Toolkit.
Cloud computing challenges and solutionsIJCNCJournal
Cloud computing is an emerging area of computer technology that benefits form the processing power and
the computing resources of many connected, geographically distanced computers connected via Internet.
Cloud computing eliminates the need of having a complete infrastructure of hardware and software to meet
users requirements and applications. It can be thought of or considered as a complete or a partial
outsourcing of hardware and software resources. To access cloud applications, a good Internet connection
and a standard Internet browser are required. Cloud computing has its own drawback from the security
point of view; this paper aims to address most of these threats and their possible solutions.
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
Abstract Data security and Access control is a challenging research work in Cloud Computing. Cloud service users upload there private and confidential data over the cloud. As the data is transferred among the server and client, the data is to be protected from unauthorized entries into the server, by authenticating the user’s and provide high secure priority to the data. So the Experts always recommend using different passwords for different logins. Any normal person cannot possibly follow that advice and memorize all their usernames and passwords. That is where password managers come in. The purpose of this paper is to secure data from unauthorized person using Security blanket algorithm.
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Cloud computing is a new term to provide application and hardware as service over the internet. Demand for cloud has increased dramatically in recent years. However, a major drawback for cloud adoption is lack of security so that we will try to solve some security issues related to cloud storage by design and implement a secure system to store privet data in cloud storage. This secure system provide secure login to cloud by using third parity authentication (smart phone) and one time password depend on chaotic system to prevent unauthorized people from get access to cloud and modified AES algorithms to encrypt the data in the cloud storage.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A survey on cloud security issues and techniquesijcsa
Today, cloud computing is an emerging way of computing in computer science. Cloud computing is a set of
resources and services that are offered by the network or internet. Cloud computing extends various
computing techniques like grid computing, distributed computing. Today cloud computing is used in both
industrial field and academic field. Cloud facilitates its users by providing virtual resources via internet. As
the field of cloud computing is spreading the new techniques are developing. This increase in cloud
computing environment also increases security challenges for cloud developers. Users of cloud save their
data in the cloud hence the lack of security in cloud can lose the user’s trust.
In this paper we will discuss some of the cloud security issues in various aspects like multi-tenancy,
elasticity, availability etc. the paper also discuss existing security techniques and approaches for a secure
cloud. This paper will enable researchers and professionals to know about different security threats and
models and tools proposed.
Cloud computing security through symmetric cipher modelijcsit
Cloud computing can be defined as an application and services which runs on distributed network using
virtualized and it is accessed through internet protocols and networking. Cloud computing resources and
virtual and limitless and information’s of the physical systems on which software running are abstracted
from the user. Cloud Computing is a style of computing in which dynamically scalable and often virtualized
resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or
control over the technology infrastructure in the "cloud" that supports them. To satisfy the needs of the
users the concept is to incorporate technologies which have the common theme of reliance on the internet
Software and data are stored on the servers whereas cloud computing services are provided through
applications online which can be accessed from web browsers. Lack of security and access control is the
major drawback in the cloud computing as the users deal with sensitive data to public clouds .Multiple
virtual machine in cloud can access insecure information flows as service provider; therefore to implement
the cloud it is necessary to build security. Therefore the main aim of this paper is to provide cloud
computing security through symmetric cipher model. This article proposes symmetric cipher model in
order to implement cloud computing security so that data can accessed and stored securely.
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
Resource pooling on internet-based accessing on use as pay environmental technology and ruled in IT field is the
cloud. Present, in every organization has trusted the web, however, the information must flow but not hold the
data. Therefore, all customers have to use the cloud. While the cloud progressing info by securing-protocols. Third
party observing and certain circumstances directly stale in flow and kept of packets in the virtual private cloud.
Global security statistics in the year 2017, hacking sensitive information in cloud approximately maybe 75.35%,
and the world security analyzer said this calculation maybe reached to 100%. For this cause, this proposed
research work concentrates on Authentication-Message-Digest-Key with authentication in routing the Network as
a Service of packets in OSPF (Open Shortest Path First) implementing Cloud with GNS3 has tested them to
securing from attackers.
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTSijujournal
In computer networks attacks plays a vital role. It also degrades a cloud services nowadays. The attacks
reduce the quality of services in the computer networks as well as cloud platforms. The attack that makes
services engaged to the intended users. For effective use of cloud computing we need to reduce the attacks
vulnerabilities and improve the security. This study discuss about the different types of attacks that affects
the cloud environments and also possible mitigation techniques to reduce the attacks. Issue mitigation
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTSijujournal
In computer networks attacks plays a vital role. It also degrades a cloud services nowadays. The attacks
reduce the quality of services in the computer networks as well as cloud platforms. The attack that makes
services engaged to the intended users. For effective use of cloud computing we need to reduce the attacks
vulnerabilities and improve the security. This study discuss about the different types of attacks that affects
the cloud environments and also possible mitigation techniques to reduce the attacks. Issue mitigation
In this paper we are study-ing about cloud computing, their types, need to use cloud computing. We also study the architecture of the mobile cloud computing. So we included new techniques for backup and restoring data from mobile to cloud. Here we proposed to apply some compres-sion technique while backup and restore data from Smartphone to cloud and cloud to the Smartphone.
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
Cloud computing provides the facility to access shared resources and common support which contributes services on demand over the network to perform operations that meet changing business needs. A cloud storage system, consisting of a collection of storage servers, affords long-term storage services over the internet. Storing the data in a third party cloud system cause serious concern over data confidentiality, without considering the local infrastructure limitations, the cloud services allow the user to enjoy the cloud applications. As the different users may be working in the collaborative relationship, the data sharing becomes significant to achieve productive benefit during the data accessing. The existing security system only focuses on the authentication; it shows that user’s private data cannot be accessed by the fake users. To address the above cloud storage privacy issue shared authority based privacy-preserving authentication protocol is used. In the SAPA, the shared access authority is achieved by anonymous access request and privacy consideration, attribute based access control allows the user to access their own data fields. To provide the data sharing among the multiple users proxy re-encryption scheme is applied by the cloud server. The privacy-preserving data access authority sharing is attractive for multi-user collaborative cloud applications.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
Cloud computing provides the facility to access shared resources and common support which contributes services on
demand over the network to perform operations that meet changing business needs. A cloud storage system, consisting of a collection
of storage servers, affords long-term storage services over the internet. Storing the data in a third party cloud system cause serious
concern over data confidentiality, without considering the local infrastructure limitations, the cloud services allow the user to enjoy the
cloud applications. As the different users may be working in the collaborative relationship, the data sharing becomes significant to
achieve productive benefit during the data accessing. The existing security system only focuses on the authentication; it shows that
user’s private data cannot be accessed by the fake users. To address the above cloud storage privacy issue shared authority based
privacy-preserving authentication protocol is used. In the SAPA, the shared access authority is achieved by anonymous access request
and privacy consideration, attribute based access control allows the user to access their own data fields. To provide the data sharing
among the multiple users proxy re-encryption scheme is applied by the cloud server. The privacy-preserving data access authority
sharing is attractive for multi-user collaborative cloud applications.
Ant colony Optimization: A Solution of Load balancing in Cloud dannyijwest
As the cloud computing is a new style of computing over internet. It has many advantages along with some
crucial issues to be resolved in order to improve reliability of cloud environment. These issues are related
with the load management, fault tolerance and different security issues in cloud environment. In this paper
the main concern is load balancing in cloud computing. The load can be CPU load, memory capacity,
delay or network load. Load balancing is the process of distributing the load among various nodes of a
distributed system to improve both resource utilization and job response time while also avoiding a
situation where some of the nodes are heavily loaded while other nodes are idle or doing very little work.
Load balancing ensures that all the processor in the system or every node in the network does
approximately the equal amount of work at any instant of time. Many methods to resolve this problem has
been came into existence like Particle Swarm Optimization, hash method, genetic algorithms and several
scheduling based algorithms are there. In this paper we are proposing a method based on Ant Colony
optimization to resolve the problem of load balancing in cloud environment.
Security & privacy issues of cloud & grid computing networksijcsa
Cloud computing is a new field in Internet computing that provides novel perspectives in internetworking
technologies. Cloud computing has become a significant technology in field of information technology.
Security of confidential data is a very important area of concern as it can make way for very big problems
if unauthorized users get access to it. Cloud computing should have proper techniques where data is
segregated properly for data security and confidentiality. This paper strives to compare and contrast cloud
computing with grid computing, along with the Tools and simulation environment & Tips to store data and
files safely in Cloud.
Virtualized Web Desktop Towards A Faster Web Cloud Operating Systemijbuiiir1
All Operating Systems provide interface to users and inherent applications running on a system. Today with the advancement in the field of cloud computing, its services are in high demand. The Cloud is becoming an active paradigm of computation through services. However, such services do not prove to be very efficient in slow networks. Thus, the paper intends to achieve faster response of services provided by the Cloud infrastructure through the use of a new mechanism of servicing client requests. The focus of the paper is to realize most operating system functions at the client side over the Cloud infrastructure using the virtualization technique. It also proposes to overcome the issues present in the current infrastructure service and resulting in a faster service
Abstract--The paper identifies the issues and the solution to overcome these problems. Cloud computing is a subscription based service where we can obtain networked storage space and computer resources. This technology has the capacity to admittance a common collection of resources on request. It is the application provided in the form of service over the internet and system hardware in the data centers that gives these services. But having many advantages for IT organizations cloud has some issues that must be consider during its deployment. The main concern is security privacy and trust. There are various issues that need to be dealt with respect to security and privacy in a cloud computing scenario [4].
Keywords--Cloud, Issues, Security, Privacy, Resources, Technology.
With expanding volumes of knowledgeable production and the variability of themes and roots, shapes and languages, most detectable issues related to the delivery of storage space for the information and the variety of treatment strategies in addition to the problems related to the flow of information and methods
go down and take an interest in the advantage of them face the researchers. In any case, such a great significance comes with a support of a great infrastructure that includes large data centers comprising thousands of server units and other supporting equipment. The cloud is not a small, undeveloped branch of it, it is a type of computing that is based on the internet, an image from the internet. Cloud Computing is a
developed technology, cloud computing, possibly offers an overall economic benefit, in that end users shares a large, centrally achieved pool of storing and computing resources, rather than owning and managing their own systems. But, it needs to be environment friendly also. This review paper gives a general overview of cloud computing, also it describes cloud computing, architecture of cloud computing, characteristics of cloud computing, and different services and deployment model of cloud computing. This paper is for anyone who will have recently detected regarding cloud computing and desires to grasp a lot of regarding cloud computing.
With expanding volumes of knowledgeable production and the variability of themes and roots, shapes and languages, most detectable issues related to the delivery of storage space for the information and the variety of treatment strategies in addition to the problems related to the flow of information and methods go down and take an interest in the advantage of them face the researchers. In any case, such a great significance comes with a support of a great infrastructure that includes large data centers comprising thousands of server units and other supporting equipment. The cloud is not a small, undeveloped branch of it, it is a type of computing that is based on the internet, an image from the internet. Cloud Computing is a developed technology, cloud computing, possibly offers an overall economic benefit, in that end users shares a large, centrally achieved pool of storing and computing resources, rather than owning and managing their own systems. But, it needs to be environment friendly also. This review paper gives a general overview of cloud computing, also it describes cloud computing, architecture of cloud computing, characteristics of cloud computing, and different services and deployment model of cloud computing. This paper is for anyone who will have recently detected regarding cloud computing and desires to grasp a lot of regarding cloud computing.
Total interpretive structural modelling on enablers of cloud computingeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Cloud computing is architecture for providing
computing service via the internet on demand and pay per use
access to a pool of shared resources namely networks, storage,
servers, services and applications, without physically acquiring
them. So it saves managing cost and time for organizations. The
market size the cloud computing shared is still far behind the one
expected. From the consumers’ perspective, cloud computing
security concerns, especially data security and privacy protection
issues, remain the primary inhibitor for adoption of cloud
computing services. The security for Cloud Computing is
emerging area for study and this paper provide security topic in
terms of cloud computing based on analysis of Cloud Security
treats and Technical Components of Cloud Computing
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
Abstract
The effect of addition of mono fibers and hybrid fibers on the mechanical properties of concrete mixture is studied in the present
investigation. Steel fibers of 1% and polypropylene fibers 0.036% were added individually to the concrete mixture as mono fibers and
then they were added together to form a hybrid fiber reinforced concrete. Mechanical properties such as compressive, split tensile and
flexural strength were determined. The results show that hybrid fibers improve the compressive strength marginally as compared to
mono fibers. Whereas, hybridization improves split tensile strength and flexural strength noticeably.
Keywords:-Hybridization, mono fibers, steel fiber, polypropylene fiber, Improvement in mechanical properties.
Material management in construction – a case studyeSAT Journals
Abstract
The objective of the present study is to understand about all the problems occurring in the company because of improper application
of material management. In construction project operation, often there is a project cost variance in terms of the material, equipments,
manpower, subcontractor, overhead cost, and general condition. Material is the main component in construction projects. Therefore,
if the material management is not properly managed it will create a project cost variance. Project cost can be controlled by taking
corrective actions towards the cost variance. Therefore a methodology is used to diagnose and evaluate the procurement process
involved in material management and launch a continuous improvement was developed and applied. A thorough study was carried
out along with study of cases, surveys and interviews to professionals involved in this area. As a result, a methodology for diagnosis
and improvement was proposed and tested in selected projects. The results obtained show that the main problem of procurement is
related to schedule delays and lack of specified quality for the project. To prevent this situation it is often necessary to dedicate
important resources like money, personnel, time, etc. To monitor and control the process. A great potential for improvement was
detected if state of the art technologies such as, electronic mail, electronic data interchange (EDI), and analysis were applied to the
procurement process. These helped to eliminate the root causes for many types of problems that were detected.
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
Abstract
Drought management needs multidisciplinary action. Interdisciplinary efforts among the experts in various fields of the droughts
prone areas are helpful to achieve tangible and permanent solution for this recurring problem. The Gulbarga district having the total
area around 16, 240 sq.km, and accounts 8.45 per cent of the Karnataka state area. The district has been situated with latitude 17º 19'
60" North and longitude of 76 º 49' 60" east. The district is situated entirely on the Deccan plateau positioned at a height of 300 to
750 m above MSL. Sub-tropical, semi-arid type is one among the drought prone districts of Karnataka State. The drought
management is very important for a district like Gulbarga. In this paper various short term strategies are discussed to mitigate the
drought condition in the district.
Keywords: Drought, South-West monsoon, Semi-Arid, Rainfall, Strategies etc.
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
Abstract
Pavements are subjected to severe condition of stresses and weathering effects from the day they are constructed and opened to traffic
mainly due to its fatigue behavior and environmental effects. Therefore, pavement rehabilitation is one of the most important
components of entire road systems. This paper highlights the design of concrete pavement with added mono fibers like polypropylene,
steel and hybrid fibres for a widened portion of existing concrete pavement and various overlay alternatives for an existing
bituminous pavement in an urban road in Bangalore. Along with this, Life cycle cost analyses at these sections are done by Net
Present Value (NPV) method to identify the most feasible option. The results show that though the initial cost of construction of
concrete overlay is high, over a period of time it prove to be better than the bituminous overlay considering the whole life cycle cost.
The economic analysis also indicates that, out of the three fibre options, hybrid reinforced concrete would be economical without
compromising the performance of the pavement.
Keywords: - Fatigue, Life cycle cost analysis, Net Present Value method, Overlay, Rehabilitation
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
Abstract
The issue of growing demand on our nation’s roadways over that past couple of decades, decreasing budgetary funds, and the need to
provide a safe, efficient, and cost effective roadway system has led to a dramatic increase in the need to rehabilitate our existing
pavements and the issue of building sustainable road infrastructure in India. With these emergency of the mentioned needs and this
are today’s burning issue and has become the purpose of the study.
In the present study, the samples of existing bituminous layer materials were collected from NH-48(Devahalli to Hassan) site.The
mixtures were designed by Marshall Method as per Asphalt institute (MS-II) at 20% and 30% Reclaimed Asphalt Pavement (RAP).
RAP material was blended with virgin aggregate such that all specimens tested for the, Dense Bituminous Macadam-II (DBM-II)
gradation as per Ministry of Roads, Transport, and Highways (MoRT&H) and cost analysis were carried out to know the economics.
Laboratory results and analysis showed the use of recycled materials showed significant variability in Marshall Stability, and the
variability increased with the increase in RAP content. The saving can be realized from utilization of recycled materials as per the
methodology, the reduction in the total cost is 19%, 30%, comparing with the virgin mixes.
Keywords: Reclaimed Asphalt Pavement, Marshall Stability, MS-II, Dense Bituminous Macadam-II
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
Abstract
Soil stabilization has proven to be one of the oldest techniques to improve the soil properties. Literature review conducted revealed
that uses of natural inorganic stabilizers are found to be one of the best options for soil stabilization. In this regard an attempt has
been made to evaluate the influence of RBI-81 stabilizer on properties of black cotton soil through laboratory investigations. Black
cotton soil with varying percentages of RBI-81 viz., 0, 0.5, 1, 1.5, 2, and 2.5 percent were studied for moisture density relationships
and strength behaviour of soils. Also the effect of curing period was evaluated as literature review clearly emphasized the strength
gain of soils stabilized with RBI-81 over a period of time. The results obtained shows that the unconfined compressive strength of
specimens treated with RBI-81 increased approximately by 250% for a curing period of 28 days as compared to virgin soil. Further
the CBR value improved approximately by 400%. The studies indicated an increasing trend for soil strength behaviour with
increasing percentage of RBI-81 suggesting its potential applications in soil stabilization.
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
Abstract
Reinforced masonry was developed to exploit the strength potential of masonry and to solve its lack of tensile strength. Experimental
and analytical studies have been carried out to investigate the effect of reinforcement on the behavior of hollow concrete block
masonry prisms under compression and to predict ultimate failure compressive strength. In the numerical program, three dimensional
non-linear finite elements (FE) model based on the micro-modeling approach is developed for both unreinforced and reinforced
masonry prisms using ANSYS (14.5). The proposed FE model uses multi-linear stress-strain relationships to model the non-linear
behavior of hollow concrete block, mortar, and grout. Willam-Warnke’s five parameter failure theory has been adopted to model the
failure of masonry materials. The comparison of the numerical and experimental results indicates that the FE models can successfully
capture the highly nonlinear behavior of the physical specimens and accurately predict their strength and failure mechanisms.
Keywords: Structural masonry, Hollow concrete block prism, grout, Compression failure, Finite element method,
Numerical modeling.
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
Abstract
Increase in traffic along with heavier magnitude of wheel loads cause rapid deterioration in pavements. There is a need to improve
density, strength of soil subgrade and other pavement layers. In this study an attempt is made to improve the properties of locally
available loamy soil using twin approaches viz., i) increasing the compaction of soil and ii) treating the soil with chemical stabilizer.
Laboratory studies are carried out on both untreated and treated soil samples compacted by different compaction efforts. Studies
show that increase in compaction effort results in increase in density of soil. However in soil treated with chemical stabilizer, rate of
increase in density is not significant. The soil treated with chemical stabilizer exhibits improvement in both strength and performance
properties.
Keywords: compaction, density, subgradestabilization, resilient modulus
Geographical information system (gis) for water resources managementeSAT Journals
Abstract
Water resources projects are inherited with overlapping and at times conflicting objectives. These projects are often of varied sizes
ranging from major projects with command areas of millions of hectares to very small projects implemented at the local level. Thus,
in all these projects there is seldom proper coordination which is essential for ensuring collective sustainability.
Integrated watershed development and management is the accepted answer but in turn requires a comprehensive framework that can
enable planning process involving all the stakeholders at different levels and scales is compulsory. Such a unified hydrological
framework is essential to evaluate the cause and effect of all the proposed actions within the drainage basins.
The present paper describes a hydrological framework developed in the form of a Hydrologic Information System (HIS) which is
intended to meet the specific information needs of the various line departments of a typical State connected with water related aspects.
The HIS consist of a hydrologic information database coupled with tools for collating primary and secondary data and tools for
analyzing and visualizing the data and information. The HIS also incorporates hydrological model base for indirect assessment of
various entities of water balance in space and time. The framework would be maintained and updated to reflect fully the most
accurate ground truth data and the infrastructure requirements for planning and management.
Keywords: Hydrological Information System (HIS); WebGIS; Data Model; Web Mapping Services
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
Abstract
The study demonstrate the potentiality of satellite remote sensing technique for the generation of baseline information on forest types
including tree plantation details in Bidar forest division, Karnataka covering an area of 5814.60Sq.Kms. The Total Area of Bidar
forest division is 5814Sq.Kms analysis of the satellite data in the study area reveals that about 84% of the total area is Covered by
crop land, 1.778% of the area is covered by dry deciduous forest, 1.38 % of mixed plantation, which is very threatening to the
environmental stability of the forest, future plantation site has been mapped. With the use of latest Geo-informatics technology proper
and exact condition of the trees can be observed and necessary precautions can be taken for future plantation works in an appropriate
manner
Keywords:-RS, GIS, GPS, Forest Type, Tree Plantation
Factors influencing compressive strength of geopolymer concreteeSAT Journals
Abstract
To study effects of several factors on the properties of fly ash based geopolymer concrete on the compressive strength and also the
cost comparison with the normal concrete. The test variables were molarities of sodium hydroxide(NaOH) 8M,14M and 16M, ratio of
NaOH to sodium silicate (Na2SiO3) 1, 1.5, 2 and 2.5, alkaline liquid to fly ash ratio 0.35 and 0.40 and replacement of water in
Na2SiO3 solution by 10%, 20% and 30% were used in the present study. The test results indicated that the highest compressive
strength 54 MPa was observed for 16M of NaOH, ratio of NaOH to Na2SiO3 2.5 and alkaline liquid to fly ash ratio of 0.35. Lowest
compressive strength of 27 MPa was observed for 8M of NaOH, ratio of NaOH to Na2SiO3 is 1 and alkaline liquid to fly ash ratio of
0.40. Alkaline liquid to fly ash ratio of 0.35, water replacement of 10% and 30% for 8 and 16 molarity of NaOH and has resulted in
compressive strength of 36 MPa and 20 MPa respectively. Superplasticiser dosage of 2 % by weight of fly ash has given higher
strength in all cases.
Keywords: compressive strength, alkaline liquid, fly ash
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
Abstract
Composite Circular hollow Steel tubes with and without GFRP infill for three different grades of Light weight concrete are tested for
ultimate load capacity and axial shortening , under Cyclic loading. Steel tubes are compared for different lengths, cross sections and
thickness. Specimens were tested separately after adopting Taguchi’s L9 (Latin Squares) Orthogonal array in order to save the initial
experimental cost on number of specimens and experimental duration. Analysis was carried out using ANN (Artificial Neural
Network) technique with the assistance of Mini Tab- a statistical soft tool. Comparison for predicted, experimental & ANN output is
obtained from linear regression plots. From this research study, it can be concluded that *Cross sectional area of steel tube has most
significant effect on ultimate load carrying capacity, *as length of steel tube increased- load carrying capacity decreased & *ANN
modeling predicted acceptable results. Thus ANN tool can be utilized for predicting ultimate load carrying capacity for composite
columns.
Keywords: Light weight concrete, GFRP, Artificial Neural Network, Linear Regression, Back propagation, orthogonal
Array, Latin Squares
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
Abstract
This paper presents an outlook on experimental behavior and a comparison with predicted formula on the behaviour of circular
concentrically loaded self-consolidating fibre reinforced concrete filled steel tube columns (HSSCFRC). Forty-five specimens were
tested. The main parameters varied in the tests are: (1) percentage of fiber (2) tube diameter or width to wall thickness ratio (D/t
from 15 to 25) (3) L/d ratio from 2.97 to 7.04 the results from these predictions were compared with the experimental data. The
experimental results) were also validated in this study.
Keywords: Self-compacting concrete; Concrete-filled steel tube; axial load behavior; Ultimate capacity.
Evaluation of punching shear in flat slabseSAT Journals
Abstract
Flat-slab construction has been widely used in construction today because of many advantages that it offers. The basic philosophy in
the design of flat slab is to consider only gravity forces; this method ignores the effect of punching shear due to unbalanced moments
at the slab column junction which is critical. An attempt has been made to generate generalized design sheets which accounts both
punching shear due to gravity loads and unbalanced moments for cases (a) interior column; (b) edge column (bending perpendicular
to shorter edge); (c) edge column (bending parallel to shorter edge); (d) corner column. These design sheets are prepared as per
codal provisions of IS 456-2000. These design sheets will be helpful in calculating the shear reinforcement to be provided at the
critical section which is ignored in many design offices. Apart from its usefulness in evaluating punching shear and the necessary
shear reinforcement, the design sheets developed will enable the designer to fix the depth of flat slab during the initial phase of the
design.
Keywords: Flat slabs, punching shear, unbalanced moment.
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
Abstract
Intake towers are typically tall, hollow, reinforced concrete structures and form entrance to reservoir outlet works. A parametric
study on dynamic behavior of circular cylindrical towers can be carried out to study the effect of depth of submergence, wall thickness
and slenderness ratio, and also effect on tower considering dynamic analysis for time history function of different soil condition and
by Goyal and Chopra accounting interaction effects of added hydrodynamic mass of surrounding and inside water in intake tower of
dam
Key words: Hydrodynamic mass, Depth of submergence, Reservoir, Time history analysis,
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
Abstract
Efficiency of the road network system is analyzed by travel time reliability measures. The study overlooks on an important measure of
travel time reliability and prioritizing Tiruchirappalli road network. Traffic volume and travel time were collected using license plate
matching method. Travel time measures were estimated from average travel time and 95th travel time. Effect of non-motorized vehicle
on efficiency of road system was evaluated. Relation between buffer time index and traffic volume was created. Travel time model has
been developed and travel time measure was validated. Then service quality of road sections in network were graded based on
travel time reliability measures.
Keywords: Buffer Time Index (BTI); Average Travel Time (ATT); Travel Time Reliability (TTR); Buffer Time (BT).
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
Abstract
The development of watershed aims at productive utilization of all the available natural resources in the entire area extending from
ridge line to stream outlet. The per capita availability of land for cultivation has been decreasing over the years. Therefore, water and
the related land resources must be developed, utilized and managed in an integrated and comprehensive manner. Remote sensing and
GIS techniques are being increasingly used for planning, management and development of natural resources. The study area, Nallur
Amanikere watershed geographically lies between 110 38’ and 110 52’ N latitude and 760 30’ and 760 50’ E longitude with an area of
415.68 Sq. km. The thematic layers such as land use/land cover and soil maps were derived from remotely sensed data and overlayed
through ArcGIS software to assign the curve number on polygon wise. The daily rainfall data of six rain gauge stations in and around
the watershed (2001-2011) was used to estimate the daily runoff from the watershed using Soil Conservation Service - Curve Number
(SCS-CN) method. The runoff estimated from the SCS-CN model was then used to know the variation of runoff potential with different
land use/land cover and with different soil conditions.
Keywords: Watershed, Nallur watershed, Surface runoff, Rainfall-Runoff, SCS-CN, Remote Sensing, GIS.
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
Abstract
Land and water are the two vital natural resources, the optimal management of these resources with minimum adverse environmental
impact are essential not only for sustainable development but also for human survival. Satellite remote sensing with geographic
information system has a pragmatic approach to map and generate spatial input layers of predicting response behavior and yield of
watershed. Hence, in the present study an attempt has been made to understand the hydrological process of the catchment at the
watershed level by drawing the inferences from moprhometric analysis and runoff. The study area chosen for the present study is
Yagachi catchment situated in Chickamaglur and Hassan district lies geographically at a longitude 75⁰52’08.77”E and
13⁰10’50.77”N latitude. It covers an area of 559.493 Sq.km. Morphometric analysis is carried out to estimate morphometric
parameters at Micro-watershed to understand the hydrological response of the catchment at the Micro-watershed level. Daily runoff
is estimated using USDA SCS curve number model for a period of 10 years from 2001 to 2010. The rainfall runoff relationship of the
study shows there is a positive correlation.
Keywords: morphometric analysis, runoff, remote sensing and GIS, SCS - method
-
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
Abstract The nonlinear Static procedure also well known as pushover analysis is method where in monotonically increasing loads are applied to the structure till the structure is unable to resist any further load. It is a popular tool for seismic performance evaluation of existing and new structures. In literature lot of research has been carried out on conventional pushover analysis and after knowing deficiency efforts have been made to improve it. But actual test results to verify the analytically obtained pushover results are rarely available. It has been found that some amount of variation is always expected to exist in seismic demand prediction of pushover analysis. Initial study is carried out by considering user defined hinge properties and default hinge length. Attempt is being made to assess the variation of pushover analysis results by considering user defined hinge properties and various hinge length formulations available in literature and results compared with experimentally obtained results based on test carried out on a G+2 storied RCC framed structure. For the present study two geometric models viz bare frame and rigid frame model is considered and it is found that the results of pushover analysis are very sensitive to geometric model and hinge length adopted. Keywords: Pushover analysis, Base shear, Displacement, hinge length, moment curvature analysis
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
Abstract
Depletion of natural resources and aggregate quarries for the road construction is a serious problem to procure materials. Hence
recycling or reuse of material is beneficial. On emphasizing development in sustainable construction in the present era, recycling of
asphalt pavements is one of the effective and proven rehabilitation processes. For the laboratory investigations reclaimed asphalt
pavement (RAP) from NH-4 and crumb rubber modified binder (CRMB-55) was used. Foundry waste was used as a replacement to
conventional filler. Laboratory tests were conducted on asphalt concrete mixes with 30, 40, 50, and 60 percent replacement with RAP.
These test results were compared with conventional mixes and asphalt concrete mixes with complete binder extracted RAP
aggregates. Mix design was carried out by Marshall Method. The Marshall Tests indicated highest stability values for asphalt
concrete (AC) mixes with 60% RAP. The optimum binder content (OBC) decreased with increased in RAP in AC mixes. The Indirect
Tensile Strength (ITS) for AC mixes with RAP also was found to be higher when compared to conventional AC mixes at 300C.
Keywords: Reclaimed asphalt pavement, Foundry waste, Recycling, Marshall Stability, Indirect tensile strength.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
A comprehensive survey on security issues in cloud computing and data privacy law in india
1. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 01 | Jan-2013, Available @ http://www.ijret.org 11
A COMPREHENSIVE SURVEY ON SECURITY ISSUES IN CLOUD
COMPUTING AND DATA PRIVACY LAW IN INDIA
Anupama Mishra1
, DhawalVyas 2
Government Engineering College, Bharatpur
Abstract
Cloud computing is a new computing paradigm that brought a lot of advantages especially in ubiquitous services where everybody can access computer
services through internet With cloud computing, there is no need of physical hardware or servers that will support the company’s computer system,
internet services and networks. Cloud computing technology is a new concept of providing dramatically scalable and virtualized resources,
bandwidth, software and hardware on demand to consumers. Consumers can typically requests cloud services via a web browser or
web service. Using cloud computing, consumers can safe cost of hardware deployment, software licenses and system maintenance. On
the other hand, it also has a few security issues. This paper introduces cloud security problems. The data in cloud need to secure from all
typesofsecurityattacks.Another core services provided by cloud computing is data storages.
Keywords— Cloud Computing, Security and Countermeasures, Consumers, XML Signature Element Wrapping, Browser
Security, Cyber Laws, policy, Data Privacy.
--------------------------------------------------------------------******----------------------------------------------------------------------
1. INTRODUCTION
Cloud computing is receiving a great deal of attention, both in
publications and among users, from individuals at home. Yet it
is not always clearly defined. Cloud computing is a
subscription-based service where you can obtain networked
storage space and computer resources. One way to think of
cloud computing is to consider your experience with email.
Your email client, if it is Yahoo!, Gmail, Hotmail, and so on,
takes care of housing all of the hardware and software
necessary to support your personal email account. When you
want to access your email you open your web browser, go to
the email client, and log in. The most important part of the
equation is having internet access. Your email is not housed
on your physical computer.Cloud computing builds on
established trends for driving the cost out of the delivery of
services while increasing the speed and agility with which
services are deployed. It shortens the time from sketching out
application architecture to actual deployment. Cloud
computing incorporates virtualization, on-demand deployment,
Internet deliveryof services, and open source software. The
benefits of cloud computing are many. One is reduced cost,
since you pay as you go. Other benefits are the portability of
the application is that users can work from home, work, or at
client locations. This increased mobility means employees can
access information anywhere they are. There is also the ability
of cloud computing to free-up IT workers who may have been
occupied performing updates, installing patches, or providing
application support. Along with the good services of Cloud
Computing has o offer, there are security problems which
make users anxious about the safety, reliability and efficiency
of migrating to cloud computing. Big companies have second
thought whether to move into the cloud because they might
compromise the operation and the important information of
the company. After analysing and calculating the possible
risk.Migrating into the “Cloud” will make computer
processing much more convenient to the users. One of the
considerations when moving to cloud is the security problems.
2. BACKGROUND
2.1 CLOUD COMPUTING MODELS
FIGURE-1
a. SaaS:Tousethe provider‟s applications runningon a cloud
infrastructure and accessiblefrom various client devices
through a thin client interface such as a Web browser.
b. PaaS:To deploy onto the cloud infrastructure consumer-
created applications using programming languagesandtools
supported by the provider(java, python, .Net)
2. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 01 | Jan-2013, Available @ http://www.ijret.org 12
c. IaaS: To provision processing, storage, networks, and
other fundamental computing resources where the
consumer is able to deploy and run arbitrary software,
which can include operating systems and applications.
2.2 LAYERS OF CLOUD COMPUTING MODEL
There are five layers in cloud computing model, the
Client Layer, Application Layer, Platform layer,
Infrastructure layer and server layer. In order to address
the security problems, every level should have security
implementation.
Client Layer: In the cloud computing model, the cloud
client consist of the computer hardware and the computer
software that is totally based on the applications of the
cloud services and basically designed in such way that it
provides application delivery to the multiple servers at
the same time, as some computers making use of the
various devices which includes computers, phones,
operating systems, browsers and other devices.
Application layer: The Cloud application services
deliver software as a service over the internet for
eliminating the need to install and run the application on
the customer own computers using the simplified
maintenance and support for the people which will use
the cloud interchangeably for the network based access
and management of the network software by controlling
the activities which is managed in the central locationsby
enabling customers to access the applications remotely
with respect to Web and application software are also
delivered to many model instances that includes the
various standards that is price, partnership and
management characteristics which provides the updates for
the centralize features.
Platform layer: In the cloud computing, the cloud
platform services provides the common computing
platform and the stack solution which is often referred as
the cloud infrastructure and maintaining the cloud
applications that deploys the applications without any cost
and complexity of the buying and managing the hardware
and software layers.
Infrastructure layer: The Cloud Infrastructure services
delivers the platform virtualization which shows onlythe
desired features and hides the other ones using the
environment in which servers, software or network
equipment are fully outsourced as the utility computing
which will based on the proper utilization of the
resources by using the principle of reusability that
includes the virtual private server offerings for the tier 3
data centerand many tie 4 attributes which is finally
assembled up to form the hundreds of the virtual
machines.
Server layer: The server layer also consist of the
computation hardware and software support for the cloud
service which is based on the multi-core processors and
cloud specific operating systemsand coined offerings.
3. NETWORK ISSUES IN CLOUD COMPUTING:
Therearedifferentnetworkissuesoccurincloudcomputingsome
ofwhicharediscussedbelow:
3-1DenialofService:
When hackers over flows a network server or web server
with frequent request of services to damage the network, the
denial of service cannot keep up with them, server could not
legitimate client regular requests. For example a hacker
hijacks the web server that could stop the functionality of the
web server from providing the services In cloud computing,
hacker attack on the server by sending thousands of requests
to the server that server is unable to respond to the regular
clients in this way server will not work properly. Counter
measure for this attack is to reduce the privileges of the user
that connected to a server. This will help to reduce the DOS
attack. (ScarfoneK,2007)
3-2 Man in the Middle Attack:
This is another issue of network security tha will happen if
secure socket layer (SSL) is not properly configured. For
example if two parties are communicating with each other
and SSL is not properly installed then all the data
communication between two parties could be hack by the
middle party. Counter measure for this attack is SSL should
properly install and it should check before communication
with other authorized parties.
3-3 Network Sniffing:
Another type of attack is network sniffer, it is a more critical
issue of network security in which unencrypted data are
hacked through network for example an attacker can hack
passwords that are not properly encrypted during
communication. If the communication parties not used
encryption techniques for data security then attacker can
capture the data during transmission as a third party. Counter
measure for this attack is parties should used encryption
methods for securing there data.
3-4 Port Scanning:
There may be some issues regarding port scanning that could
be used by an attacker as Port80 (HTTP) is always open that
is used for providing web services to the user. Other ports
such as 21 (FTP) etc are not opened all the time it will open
when needed therefore ports should be secured by encrypted
until and unless the server software is configured properly.
Counter measure for this attack is that fire wall is used to
secure the data from port attacks.(Services,2009).
3. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 01 | Jan-2013, Available @ http://www.ijret.org 13
3-5 SQL Injection Attack:
SQL injection attacks are the attacks where a hackers uses the
special characters to return the data for example in SQL scripting
the query end up with where clause that may be modified by
adding more information in it. For example an argument value of
variable y or 1 == 1 may cause there turn of full table because 1
== 1 is always seems to be true.
3-6 Cross Site Scripting:
It is a type of attack in which user enters right URL of a web site
and hacker on the others it redirect the user to its own web site
and hack its credentials. For example user entered the URL in
address bar and attacker redirects the user to hacker site and then
he will obtain the sensitive data of the user. Cross site scripting
attacks can provide the way to buffer overflows, DOS attacks and
inserting spiteful software into the web browsers for violation of
user‟s credentials. (Yang,2003)
4. SECURITY ISSUES IN CLOUD COMPUTING:
Security issues of cloud computing are discussed below:
4-1 XML Signature Element Wrapping:
XML signature Element Wrapping is the fine renowned
attack for web service. It is use to defend a component
name, attribute and value from illegal party but unable to
protect the position in the documents. (Jamil&Zaki, 2011b)
Attacker targets the component by operating the SOAP
messages and putting anything that attacker like. Counter
measure for this attack is using the digital certificate e.g.
X.509 authorized by third party such as certificate
authorities and also uses the mixture of WS-security with
XML signature to a particular component. The following
graph presents a view of the rate of cyber attacks in last 10
years.
4-2 Browser Security:
The second issue is Browser Security. As a client sent the
request to the server by web browser the web browser have
to make use of SSL to encrypt the credentials to
authenticate the user. If hacker installs sniffing packages
on intermediary host, the attacker may get the credentials of
the user and use in these credentials in the cloud system as
a valid user. (Jensen, 2009) Counter measure for this
attack is Vendor should use WS-security concept on web
browsers .
FIGURE-2
4-3 Cloud Malware Injection Attack:
The third issue is Cloud Malware Injection Attack, which
tries to damage a spiteful service, application or virtual
machine. An interloper is obligatory to generate his personal
spiteful application, service or virtual machine request and
put it into the cloud structure (Booth, 2004). Once the
spiteful software is entered into the cloud structure, the
attacker care for the spiteful software as legitimate
request. If successful user ask for the spiteful service then
malicious is implemented. Attacker upload virus program in
to the cloud structure. Counter measure for this attack
isauthenticity check for received messages. Store the original
image file of the request by using hash function and compare
it with the hash value of all upcoming service requests.
4-5 Data Protection:
Data protection in cloud computing is very important factor it
could be complicated for the cloud customer toefficiently
check the behavior of the cloud supplier and as a result he is
confident that data is handled in a legal way, but it does not
like that this problem is intensify in case of various
transformation of data. Counter measure this attack is that a
consumer of cloud computing should check data handle
either it is handled lawfully or not.
FIGURE-4
4. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 01 | Jan-2013, Available @ http://www.ijret.org 14
5. SECURITY ISSUE CAUSES AND SOLUTIONS:
We will focus on specific problems for various kind of
attacks in the cloud: a) Wrapping attack, b) Malware-
Injection attack, c) Flooding attack, d) Data stealing that can
result from a Browser attack and e) Accountability checking.
Wrapping Attack Problem:When a user makes a requestfrom
his VM through the browser, the request is first directed
to the web server. In this server, a SOAP message is
generated. This message contains the structural information
that will be exchanged between the browser and server
during the message passing. Before message passing occurs,
the XML document needs to be signed and canonicalization
has to be done. Finally, the SOAP header should contain
all the necessary information for thedestination after
computation is done.For a wrapping attack, the adversary
does its deception during the translation of the SOAP
message in the TLS (Transport Layer Service) layer. The
body of the message is duplicated and sent to the server as
a legitimate user. Theserver checks the authentication by
the Signature Valuewhich is also duplicated) and integrity
checking for themessage is done. As a result, the adversary
is able to intrudein the cloud and can run malicious code to
interrupt the usualfunctioning of the cloud servers.
Wrapping Attack Solution:
Since an adversary can intrude in the TLS layer; we propose
to increase the security during the message passing from the
web server to a web browser by using the SOAP message.
Specifically, as thesignature value is appended, we can add
a redundant bit (STAMP bit) with the SOAP header. This bit
will be toggled when the message is interfered with by a third
party during the transfer. When it is received in the
destination, theSTAMP bit is checked first and if it is found
toggled, then anew signature value is generated in the browser
end and thenew value sent back to the server as recorded to
modify theauthenticity checking.
Malware-Injection Attack Problem:In a malware-injection
attack, an adversary attempts to inject malicious service or
code, which appears as one of the valid instance services
running in the cloud. If the attacker is successful, then the
cloud service will suffer from eavesdropping. This can be
accomplished via subtle data modifications to changethe
functionality, or causing deadlocks, which forces a
legitimate user to wait until the completion of a job which
was not generated by the user.This type of attack is also
known as ameta-data spoofing attack.When an instance of a
legitimate user is ready to run in the cloud server, then the
respective service accepts the instance for computation in
the cloud.
Malware-Injection Attack Solution: Usually when a
customer opens an account in the cloud, the provider creates
an image of the customer‟s VM in the image repository
system of the cloud. The applications that the customer
willrun are considered with high efficiency and integrity.
Wepropose to consider the integrity in the hardware level,
because it is very difficult for an attacker to intrude in
theIaaS level. We utilize the File Allocation Table (FAT)
system architecture, since its straightforward technique is
supported by virtually all existing operating systems From
the FAT table we can know about the code or application
that a customer is going to run.
Flooding Attacks: The fourth issue is Flooding Attack.
Attacker attacks the cloud system openly. The most significant
feature of cloud system is to make available of vigorously
scalable recourses. Cloud system repeatedly increase its size
when there is further requests from clients, cloud system
initialize new service request in order to maintain client
requirements. Flooding attack is basically distributing a great
amount of non-sense requests to a certain service. Once the
attacker throw a great amount of requests, by providing more
recourses cloud system will attempt to work against the
requests, ultimately system consume all recourses and not
capable to supply service to normal requests from user. Then
attacker attacks the service server.
Flooding Attacks solutions: Counter measure for this attack is
it‟s not easy to stop Dos Attacks. To stop from attacking the
server, Intrusion detection system will filter the malicious
requests, installing firewall.
Data Stealing Problem: This is the most traditional and
common approach to breach a user account. The user
account and password are stolen by any means. As a result,
the subsequent stealing of confidential data or even
thedestroying of data can hamper the storage integrity and
security of the cloud.
Data Stealing Solution: At the end of every session, the
customer will send an e-Mail about the usage and duration
with a special number to be used for log in next time. In this
way, the customer will be aware of the usage and charges as
well as be availed with a unique number to be used every
time to access the system.
Accountability Check Problem: The payment method in
acloud System is “No use No bill”. When a customer
launches an instance, the duration of the instance,
theamount of data transfer in the network and the number
of CPU cycles per user are all recorded. Based on this
recorded information, the customer is charged. So, when
an attacker has engaged the cloud with a malicious service
or runs malicious code, which consumes a lot of
computationalpower and storage from the cloud server, then
the legitimate account holder is charged for this kind of
computation. As a result, a dispute arises and business
reputations are hampered.
As there are some security issues in cloud so we need some
strong laws against these issues keeping that in mind expearts
5. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 01 | Jan-2013, Available @ http://www.ijret.org 15
decided to form some laws against these issues .Then on the
Information Technology (Reasonable security practices and
procedures and sensitive personal data or information) Rules,
2011, which came into effecton11 April, 2011.
FIGURE-5
6. LAWS OF PRIVACY IN INDIA:
The Data Privacy Law in India is contained primarily in:
1. Section43A of the Information Technology Act
2InformationTechnology(Reason a security practices and
procedures and sensitive personal data or information)
Rules,2011.
3. Section 72 A of the Information Technology Act This paper
focuses on the Information Technology(Reasonable security
practices and procedures and sensitive personal data or
information) Rules, 2011, which came into effect on 11 April,
2011.These are referred to as Data$Privacy$ Rules in this paper.
The Data Privacy Rules relate to information of two primary
types:
1."Personalinformation"which means any information that
relates to a natural person, which, either directly or indirectly, in
combination with other information available or likely to be
available with a body corporate, is capable of identifying such
person.
2. "Sensitive personal data or information" of a person Sensitive
personal data or information does not include any information
that is freely available or accessible in public domain or
furnished under the Right to Information Act, 2005 or any
other law. Data Privacy Rules includes :
1. Insurance companies
2. Banks
3. Hospitals
4. All business organizations
5. Doctors,
6. Stockbrokers
7. chartered accountants
8. Retails stores, restaurants, ecommerce
Companies.
7. Call centers, BPOs, LPOs etc.
All these entities are required by law to provide a data privacy
policy on their website. This policy should providedetails
relating to:
1. Clear and easily accessible statements of its
practices and policies,
2. Type of information collected,
3. Purpose of collection and usage of such information,
4. Disclosure of information
5. Reasonable security practices and procedures
All these entities must obtain consent from the provider of the
information regarding purpose of usage before collection of
such information.
Privacy policy for handling of or dealing in personal
information including sensitive personal data or
information of customers and employees as mandated by
Rule 4 of Information Technology (Reasonable security
practices and procedures and sensitive personal data or
information) Rules, 2011.NonDcompliance with any of the
provisions of the data $privacy $rules is penalized with a
compensation /penalty of upto Rs. 25,000 under section 45
of the Information Technology Act. Additionally, in some
cases there may be liability under section 43A of the
Information Technology Act. Under the original
Information Technology Act, 2000, compensation claims
were restricted to Rs. 1crore. Now claims up to Rs 5crore are
under the jurisdiction of Adjudicating Officers. Claims above
Rs5crore are under the jurisdiction of the relevant courts.
Additionally, in some cases there may be liability under
section 72A of the Information Technology Act. This
section provides for imprisonment upto 3 years and / or
fine uptoRs 5 lakh.
7. INFORMATION TECHNOLOGY AUDIT
&COMPLIANCE SENSITIVE PERSONAL DATA
ORINFORMATION RULES
MINISTRY OF COMMUNICATIONS ANDINFORMATION
TECHNOLOGY
(Department of Information Technology)
NOTIFICATION
New Delhi, the 11th April, 2011
G.S.R. 313(E).—In exercise of the powers conferred by clause
(ob) of sub-section (2) of section 87 read with section
43A of the Information Technology Act,2000 (21 of 2000),
the Central Government hereby makes the following rules,
namely.—
6. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 01 | Jan-2013, Available @ http://www.ijret.org 16
1. Short title and commencement
(1) These rules may be called the Information Technology
(Reasonable security practices and procedures and sensitive
personal data or information) Rules, 2011.
(2) They shall come into force on the date of their publication
in the Official Gazette.
2. Definitions —
(1) In these rules, unless the context otherwise requires,
(a)"Act" means the Information Technology Act, 2000
(21 of 2000);
(b)"Biometrics" means the technologies that measure
and analyse human body characteristics, such as
'fingerprints', 'eye retinas and irises', 'voice patterns',
"facial patterns”, „hand measurements' and 'DNA' for
authentication purposes;
(c)"Body corporate" means the body corporate as
defined in clause (i) of explanation to section 43A of
the Act;
(d) "Cyber incidents" means any real or suspected
adverse event in relation to cyber security that violates
an explicitly or implicitly applicable security policy
resulting
In unauthorised access, denial of service or disruption,
unauthorised use of a computer resource for
processing or storage of information or changes to data,
information without authorisation;
(e)"Data" means data as defined in clause (o) of sub-
section (1) of section 2 of the Act;
(f)"Information" means information as defined in clause
(v) of sub-section (1) of section 2 of the Act;
(g)"Intermediary" means an intermediary as defined in
clause (w) of sub-section
(1) of section 2 of the Act;
(h) "Password" means a secret word or phrase or code or
passphrase or secret key or encryption or decryption
keys that one uses to gain admittance or access to
information;
(i)"Personal information" means any information that
relates to a natural person,which, either directly or
indirectly, in combination with other information
available or likely to be available with a body corporate,
is capable of identifying such person.
(2) All other words and expressions used and not defined in
these rules but defined in theAct shall have the meanings
respectively assigned to them in the Act.
3.Sensitive personal data or information.
Sensitive personal data or information of a person means such
personal information which consists of information relating
to;—
(i) password;
(ii) financial information such as Bank account or credit
card or debit card or other payment instrument details ;
(iii) physical, physiological and mental health condition;
(iv) sexual orientation;
(v) medical records and history;
(vii) any detail relating to the above clauses as provided
to body corporate for providing service; and
(viii) any of the information received under above clauses
by body corporate for processing, stored or processed
under lawful contract or otherwise:
provided that, any information that is freely available or
accessible in public domain for furnished under the Right
to Information Act, 2005 or any other law for the time
being in force shall not be regarded as sensitive personal
data or information for the purposes of these rules.
4. Body corporate to provide policy for privacy and disclosure
of information.— (1)
The body corporate or any person who on behalf of body
corporate collects, receives, possess, stores, deals or handle
information of provider of information, shall provide a
privacy policy for handling of or dealing in personal
information including sensitive personal data or information
and ensure that the same are available for view by such
providers of information who has provided such
information under lawful contract.
(i) Clear and easily accessible statements of its practices
and policies;
(ii) type of personal or sensitive personal data or
information collected under rule 3;
(iii) purpose of collection and usage of such information;
(iv) disclosure of information including sensitive personal
data or information as provided in rule 6;
(v) reasonable security practices and procedures as
provided under rule 8.
5. Collectionofinformation.
(1)Body corporate or any person on its behalf shallobtain
consent in writing through letter or Fax or email from the
provider of the sensitive personal data or information
regarding purpose of usage before collection of such
information.
(2) Body corporate or any person on its behalf shall not
collect sensitive personal data or information unless
(a) the information is collected for a lawful purpose
connected with a function or activity of the body
corporate or any person on its behalf; and
7. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 01 | Jan-2013, Available @ http://www.ijret.org 17
(b) The collection of the sensitive personal data or
information is considered necessary for that purpose.
(3) While collecting information directly from the person
concerned, the body corporate or any person on its
behalf snail take such steps as are, in the
circumstances, reasonable to ensure that the person
concerned is having the knowledge of
(a) the fact that the information is being collected;
(b) the purpose for which the information is being
collected; (c) the intended recipients of the information;
and
(d) the name and address of
(i) the agency that is collecting the information;
and
(ii) the agency that will retain the information.
(4) Body corporate or any person on its behalf holding
sensitive personal data or information shall not retain that
information for longer than is required for the purposes
for which the information may lawfully be used or is
otherwise required under any other law for the time being in
force.
(5) The information collected shall be used for the
purpose for which it has been collected.
(6) Body corporate or any person on its behalf permit the
providers of information, as and when requested by them,
to review the information they had provided and ensure
that any personal information or sensitive personal data
or information found to be inaccurate or deficient shall be
corrected or amended as feasible:Provided that a body
corporate shall not be responsible for the authenticity of
the personal information or sensitive personal data or
information supplied bythe provider of information to such
boy corporate or any other person acting on behalf of such
body corporate.
6. Disclosure of information.
(1) Disclosure of sensitive personal data or information by
body corporate to any third party shall require prior
permission from the provider of such information, who has
provided such information under lawful contract or otherwise,
unless such disclosure has been agreed to in the contract
between the body corporate and provider of information, or
where the disclosure is necessary for compliance of a
legal obligation.
(2) Notwithstanding anything contain in sub-rule (1), any
sensitive personal data on Information shall be disclosed to
any third party by an order under the law for the time being in
force.
(3)The body corporate or any person on its behalf shall
not publish the sensitive personal data or information.
(4) The third party receiving the sensitive personal data or
information from body corporate or any person on its behalf
under sub-rule (1) shall not disclose it further.
7. Transfer of information.
A body corporate or any person on its behalf may
transfersensitive personal data or information including
any information, to any other body corporate or a person in
India, or located in any other country, that ensures the same
levelof data protection that is adhered to by the body
corporate as provided for under these Rules.
8. Reasonable Security Practices and Procedures.
(1) A body corporate or a person on its behalf shall be
considered to have complied with reasonable security
practices and procedures, if they have implemented such
security practices and standards and have a comprehensive
documented information security programme and
information security policies that contain managerial,
technical, operational and physical security control
measures that are commensurate with the information
assets being protected with the nature of business.
(2) The international Standard IS/ISO/IEC 27001 on
"Information
(3) Any industry association or an entity formed by such an
association, whose members are self-regulating by following
other than IS/ISO/IEC codes of best practices for data
protection as per sub-rule(1), shall get its codes of best
practices duly approved and notified by the Central
Government for effective implementation.
(4) The body corporate or a person on its behalf who have
implemented either IS/ISO/IEC 27001 standard or the codes
of best practices for data protection as approved and notified
under sub-rule
(5) shall be deemed toG have complied with reasonable
security practices and procedures provided that such
standard or the codes of best practices have been
certified , duly approved by the CentralGovernment.
CONCLUSIONS AND FUTURE WORK
Cloud computing is a new term that is introduced in business
environment where users can interact directly with the
virtualized resources and safe the cost for the consumers.
Some security issues and their counter measures are
discussed in this paper. It has several models to protect its
data for the business users. An organization used private
clouds within its organization to prevent from loss of data.
Cloud computing have several deployment models that help
in retrieving the information. SAAS, PAAS, IAAS are the
three models for cloud computing. Security in cloud
computing consist of security abilities of web browsers and
web service structure. Some laws of data pravicy are also
discussed in this papare. Under these laws there are also the
provision for compensation andimprisonment.These rules
and laws has been proved successful in resolving the
security issues of cloud computing.
8. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 01 | Jan-2013, Available @ http://www.ijret.org 18
REFERENCES
[1] “Attack on Cloud Computing” By NaradWaheed.
[2]“Complying with the Data Privacy Law in India” By
RohasNagpl Asian School of Cyber
Laws.Publishedin2012byAsianSchoolofCyberLaws.!
[3] “Security Attacks and Solutions in Clouds”
KaziZunnurhain and Susan V. VrbskyDepartment of
Computer Science ,The University of Alabama ,Tuscaloosa,
AL 35487-0290, e-mail- kzunnurhain@crimson.ua.edu,
vrbsky@cs.ua.edu
[4]“Securevirtualizationforcloudcomputing”FlavioLombardia
,RobertoDiPietrob,c,..aConsiglioNazionaledelleRicerche,DCSP
I-SistemiInformativi,PiazzaleAldoMoro7,00187Roma,Italy
bUniversitadiRomaTre,DipartimentodiMatematica,L.goS.Leo
nardoMurialdo,100149Roma,Italy
cUNESCOChairinDataPrivacy,UniversitatRoviraiVirgili,Tarra
gona,Spain
[5] Danish Jamil et al. / International Journal of Engineering
Science and Technology (IJEST)”SECURITY ISSUES IN
CLOUD COMPUTING AND COUNTERMEASURES”
DANISH JAMIL Department of Computer Engineering, Sir
Syed University of Engineering & Technology, Main
University Road, Karachi, Sindh-75300, Pakistan,HASSAN
ZAKI Department of Computer Engineering, Sir Syed
University of Engineering & Technology, Main
UniversityRoad, Karachi, Sindh-75300, Pakistan
[6]“The Basics of Cloud Computing”AlexaHuth and James
Cebulahttp://csrc.nist.gov/publications/drafts/800-145/Draft-
SP-800-145_cloud-definition.pdf