Guddu Kumar. “A Review on Data Protection of Cloud Computing Security, Benefits, Risks and Suggestions” United International Journal for Research & Technology (UIJRT) 1.2 (2019): 26-34.
Cloud computing is architecture for providing
computing service via the internet on demand and pay per use
access to a pool of shared resources namely networks, storage,
servers, services and applications, without physically acquiring
them. So it saves managing cost and time for organizations. The
market size the cloud computing shared is still far behind the one
expected. From the consumers’ perspective, cloud computing
security concerns, especially data security and privacy protection
issues, remain the primary inhibitor for adoption of cloud
computing services. The security for Cloud Computing is
emerging area for study and this paper provide security topic in
terms of cloud computing based on analysis of Cloud Security
treats and Technical Components of Cloud Computing
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Cloud computing is architecture for providing
computing service via the internet on demand and pay per use
access to a pool of shared resources namely networks, storage,
servers, services and applications, without physically acquiring
them. So it saves managing cost and time for organizations. The
market size the cloud computing shared is still far behind the one
expected. From the consumers’ perspective, cloud computing
security concerns, especially data security and privacy protection
issues, remain the primary inhibitor for adoption of cloud
computing services. The security for Cloud Computing is
emerging area for study and this paper provide security topic in
terms of cloud computing based on analysis of Cloud Security
treats and Technical Components of Cloud Computing
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Best cloud computing training institute in noidataramandal
TECHAVERA is offering best In Class, Corporate and Online cloud computing Training in Noida. TECHAVERA Delivers best cloud Live Project visit us - http://www.techaveranoida.in/best-cloud-computing-training-in-noida.php
Cloud computing challenges with emphasis on amazon ec2 and windows azureIJCNCJournal
Cloud Computing has received much attention by the IT-Business world. As compared to the common
computing platforms, cloud computing is more flexible in supporting real-time computation and is
considered a more powerful model for hosting and delivering services over the Internet. However, since
cloud computing is still at its infancy, it faces many challenges that stand against its growth and spread.
This article discusses some challenges facing cloud computing growth and conducts a comparison study
between Amazon EC2 and Windows Azure in dealing with such challenges. It concludes that Amazon EC2
generally offers better solutions than Windows Azure. Nevertheless, the selection between them depends on
the needs of customers.
A detailed study of cloud computing is presented. Starting from its basics, the characteristics and different modalities
are dwelt upon. Apart from this, the pros and cons of cloud computing is also highlighted. Apart from this, service
models of cloud computing are lucidly highlighted.
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...Sushil kumar Choudhary
Cloud computing is a network-based environment that focuses on sharing computations, Cloud computing networks access to a shared pool of configurable networks, servers, storage, service, applications & other important Computing resources. In modern era of Information Technology, the accesses to all information about the important activities of the related fields. In this paper discuss the advantages, disadvantages, characteristics, challenge, deployment model, cloud service model, cloud service provider & various applications areas of cloud computing such as small & large scale (manufacturing, automation, television, broadcast, constructions industries), Geographical Information system (GIS), Military intelligence fusion (MIS), business management, banking, Education, healthcare, Agriculture sector, E-Governance, project planning, cloud computing in family etc.
Cloud computing of late has become the new buzz word joining the ranks of terms including; grid computing, utility computing, virtualization, clustering, etc. However the problem is that everyone seems to have a different definition..
Types of Cloud services: Software as a Service, Platform as a Service – Infrastructure as a Service, Database as a Service, Monitoring as a Service, Communication as services. Service providers- Google App Engine, Amazon EC2, Microsoft Azure, Sales force
Abstract--The paper identifies the issues and the solution to overcome these problems. Cloud computing is a subscription based service where we can obtain networked storage space and computer resources. This technology has the capacity to admittance a common collection of resources on request. It is the application provided in the form of service over the internet and system hardware in the data centers that gives these services. But having many advantages for IT organizations cloud has some issues that must be consider during its deployment. The main concern is security privacy and trust. There are various issues that need to be dealt with respect to security and privacy in a cloud computing scenario [4].
Keywords--Cloud, Issues, Security, Privacy, Resources, Technology.
Intro to cloud computing. Answering the question what, how and why. The components used in it. The tech formed from what. who give the cloud computing services for now.
Best cloud computing training institute in noidataramandal
TECHAVERA is offering best In Class, Corporate and Online cloud computing Training in Noida. TECHAVERA Delivers best cloud Live Project visit us - http://www.techaveranoida.in/best-cloud-computing-training-in-noida.php
Cloud computing challenges with emphasis on amazon ec2 and windows azureIJCNCJournal
Cloud Computing has received much attention by the IT-Business world. As compared to the common
computing platforms, cloud computing is more flexible in supporting real-time computation and is
considered a more powerful model for hosting and delivering services over the Internet. However, since
cloud computing is still at its infancy, it faces many challenges that stand against its growth and spread.
This article discusses some challenges facing cloud computing growth and conducts a comparison study
between Amazon EC2 and Windows Azure in dealing with such challenges. It concludes that Amazon EC2
generally offers better solutions than Windows Azure. Nevertheless, the selection between them depends on
the needs of customers.
A detailed study of cloud computing is presented. Starting from its basics, the characteristics and different modalities
are dwelt upon. Apart from this, the pros and cons of cloud computing is also highlighted. Apart from this, service
models of cloud computing are lucidly highlighted.
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...Sushil kumar Choudhary
Cloud computing is a network-based environment that focuses on sharing computations, Cloud computing networks access to a shared pool of configurable networks, servers, storage, service, applications & other important Computing resources. In modern era of Information Technology, the accesses to all information about the important activities of the related fields. In this paper discuss the advantages, disadvantages, characteristics, challenge, deployment model, cloud service model, cloud service provider & various applications areas of cloud computing such as small & large scale (manufacturing, automation, television, broadcast, constructions industries), Geographical Information system (GIS), Military intelligence fusion (MIS), business management, banking, Education, healthcare, Agriculture sector, E-Governance, project planning, cloud computing in family etc.
Cloud computing of late has become the new buzz word joining the ranks of terms including; grid computing, utility computing, virtualization, clustering, etc. However the problem is that everyone seems to have a different definition..
Types of Cloud services: Software as a Service, Platform as a Service – Infrastructure as a Service, Database as a Service, Monitoring as a Service, Communication as services. Service providers- Google App Engine, Amazon EC2, Microsoft Azure, Sales force
Abstract--The paper identifies the issues and the solution to overcome these problems. Cloud computing is a subscription based service where we can obtain networked storage space and computer resources. This technology has the capacity to admittance a common collection of resources on request. It is the application provided in the form of service over the internet and system hardware in the data centers that gives these services. But having many advantages for IT organizations cloud has some issues that must be consider during its deployment. The main concern is security privacy and trust. There are various issues that need to be dealt with respect to security and privacy in a cloud computing scenario [4].
Keywords--Cloud, Issues, Security, Privacy, Resources, Technology.
Intro to cloud computing. Answering the question what, how and why. The components used in it. The tech formed from what. who give the cloud computing services for now.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Challenges and Benefits-for Adopting the Paradigm of Cloud ComputingMervat Bamiah
Cloud computing is a rapidly emerging technology that has removed the saddle of buying licensed software and heavy hardware. By exploiting this technology, clients are able to access resources remotely by using a simple web browser. They are not required to maintain hardware devices or software applications, so it saves managing cost and time for organizations. Many industries, such as banking, healthcare, and education, are moving towards the cloud due to the efficiency of services provided by the pay-per-use pattern. The utilization and payment process of cloud computing is similar to other common utilities such as electricity. As the users of electricity are only required to pay for the amount of electricity consumed throughout the month. Similarly, cloud providers charge the users based on the exploitation of a cloud system or resources such as processing power used, transactions carried out, bandwidth consumed, data transferred, or storage space occupied. Cloud computing is a completely internet dependent technology where client data is stored in the data center of a cloud provider. There are various challenges for adopting cloud computing such as privacy, interoperability and reliability. Beside these challenges, there are also several benefits for adopting this technology such as cost savings, easy scalability, and increased productivity. This research paper introduces a big picture of cloud computing and analyzes the key challenges as well as benefits of adopting the paradigm of cloud computing.
Cloud Computing Basics Features and Servicesijtsrd
Cloud computing is an on demand service in which distributed resources, information, software and other devices are provided according to the client's requirement at specific time 1 . Cloud computing involves deploying groups of remote servers and software networks that allow centralized data storage and online access to computer services or resources. In this paper, we explore the different services in different computing platforms and applications. Cloud computing is a service, which offers customers to work over the internet 2 . Kyi Pyar | Me Me Khaing "Cloud Computing Basics: Features and Services" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd27960.pdfPaper URL: https://www.ijtsrd.com/computer-science/distributed-computing/27960/cloud-computing-basics-features-and-services/kyi-pyar
This is a literature survey about security issues and countermeasures on cloud computing. This paper discusses about an overview of cloud computing and security issues of cloud computing.
Load Balancing In Cloud Computing:A ReviewIOSR Journals
Abstract: As the IT industry is growing day by day, the need of computing and storage is increasing
rapidly. The amount of data exchanged over the network is constantly increasing. Thus the process of this
increasing mass of data requires more computer equipment to meet the various needs of the organizations.
To better capitalize their investment, the over-equipped organizations open their infrastructures to others by
exploiting the Internet and other important technologies such as virtualization by creating a new computing
model: the cloud computing. Cloud computing is one of the significant milestones in recent times in the
history of computers. The basic concept of cloud computing is to provide a platform for sharing of resources
which includes software and infrastructure with the help of virtualization. This paper presents a brief review
of cloud computing. The main emphasize of this paper is on the load balancing technique in cloud
computing.
Keywords: Cloud Computing, Load Balancing, Dynamic Load Balancing, Virtualization, Data Center.
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...iosrjce
Cloud computing is an important transition that makes change in service oriented computing
technology. Cloud service provider follows pay-as-you-go pricing approach which means consumer uses as
many resources as he need and billed by the provider based on the resource consumed. CSP give a quality of
service in the form of a service level agreement. For transparent billing, each billing transaction should be
protected against forgery and false modifications. Although CSPs provide service billing records, they cannot
provide trustworthiness. It is due to user or CSP can modify the billing records. In this case even a third party
cannot confirm that the user’s record is correct or CSPs record is correct. To overcome these limitations we
introduced a secure billing system called THEMIS. For secure billing system THEMIS introduces a concept of
cloud notary authority (CNA). CNA generates mutually verifiable binding information that can be used to
resolve future disputes between user and CSP. This project will produce the secure billing through monitoring
the service level agreement (SLA) by using the SMon module. CNA can get a service logs from SMon and stored
it in a local repository for further reference. Even administrator of a cloud system cannot modify or falsify the
data.
Cloud computing provide us a means by which we can access the applications as utilities, over the Internet. It allows us to create, configure, and customize applications online.
With cloud computing users can access database resources via the internet from anywhere for as long as they need without worrying about any maintenance or management of actual resources.
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...ijtsrd
Cloud computing is an emerging model of business computing. Cloud computing is a service, which offers customers to work over the internet. It simply states that cloud computing means storing and accessing the data and programs over the internet rather than the computer's hard disk. The data can be anything such as music, files, images, documents, and many more. The user can access the data from anywhere just with the help of an internet connection. To access cloud computing, the user should register and provide with ID and password for security reasons. The speed of transfer depends on various factors such as internet speed, the capacity of the server, and many more. In this paper, we explore the understanding the determinates of security and privacy in cloud computing, Cloud Computing architecture and We also address the characteristics and applications of several popular cloud computing platforms. We identified several challenges from the cloud computing adoption perspective and we also highlighted the cloud interoperability issue that deserves substantial further research and development. However, security and privacy issues present a strong barrier for users to adapt to cloud computing systems. Yin Myo Kay Khine Thaw | Khin Myat Nwe Win "Understanding the Determinants of Security and Privacy in Cloud Computing Architecture" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26452.pdfPaper URL: https://www.ijtsrd.com/computer-science/distributed-computing/26452/understanding-the-determinants-of-security-and-privacy-in-cloud-computing-architecture/yin-myo-kay-khine-thaw
T. Srilatha, 2021. Detection of Hazardous Gases Using the Sensors and Passing Alerts to the Neighbourhood Though Mobile Cloud. United International Journal for Research & Technology (UIJRT), 3(1), pp.19-23.
Kurniasari, F. and Riyadi, W.T., 2021. Determinants of Indonesian E-Grocery Shopping Behavior After Covid-19 Pandemic Using the Technology Acceptance Model Approach. United International Journal for Research & Technology (UIJRT), 3(1), pp.12-18.
Olorunnisola, A.O., Richards, A. and Omoniyi, T.E., 2021. A Review on the Renewable Energy from Agricultural and Forest Residues in Nigeria. United International Journal for Research & Technology (UIJRT), 3(1), pp.04-11.
Abideen Adeyinka Adekanmi, Adeniyi Sheriffdeen Adekanmi and Uthman Taiwo Adekanmi “Biotreatment of Slaughterhouse Waste Water by Microalgae” United International Journal for Research & Technology (UIJRT), Volume 01, Issue 09, pp. 19-30, 2020. https://uijrt.com/articles/v1i9/UIJRTV1I90003.pdf
Idowu Olusegun Oladele “Emerging Trends in Private Security Companies (PSCs) and Security Services in Southwest Nigeria” United International Journal for Research & Technology (UIJRT), Volume 01, Issue 09, pp. 04-18, 2020. https://uijrt.com/articles/v1i9/UIJRTV1I90002.pdf
Dr. S. Saravana Kumar “A Systematic Review on the Educational Data Mining and its Implementation in the Applications ” United International Journal for Research & Technology (UIJRT), Volume 01, Issue 09, pp. 01-03, 2020. https://uijrt.com/articles/v1i9/UIJRTV1I90001.pdf
Larry Lanzema Dangana and Halil Zafer Alibaba,“Effects of Thermal Insulation Deficits in Famagusta Buildings” United International Journal for Research & Technology (UIJRT), Volume 01, Issue 07, pp. 05-13, 2020. https://uijrt.com/articles/v1i7/UIJRTV1I70001.pdf
Larry Lanzema Dangana “Feasibility Analysis of Applying Thermal Insulation Composite Wall in Residential Buildings” United International Journal for Research & Technology (UIJRT), Volume 01, Issue 07, pp. 01-04, 2020. https://uijrt.com/articles/v1i7/UIJRTV1I70001.pdf
Salimat Yewande Bakare and Halil Zafer Alibaba,“The Construct of Comfort: A Case Study of Environmental Comfort of University Classrooms” United International Journal for Research & Technology (UIJRT), Volume 01, Issue 06, pp. 19-23, 2020. https://uijrt.com/articles/v1i6/UIJRTV1I60003.pdf
Mulugeta Bantigegn, Achenef Motbainor and Teferi Mekonnon,“Onsite Proper Solid Waste Handling Practices and Associated Factors Among Condominium Residents in Debre-Markos Town, East Gojjam Zone, North West Ethiopia: A Community Based Cross-Sectional Study” United International Journal for Research & Technology (UIJRT), Volume 01, Issue 06, pp. 01-11, 2020. https://uijrt.com/articles/v1i6/UIJRTV1I60001.pdf
The Effects of Flooring Material on Thermal Comfort in a Comparative Study Marble and Parquet Flooring
https://uijrt.com/articles/v1i5/UIJRTV1I50004.pdf
Structuring Alternative Investment in Public Private Partnership Projects Using Islamic Financial Instruments
https://uijrt.com/articles/v1i5/UIJRTV1I50002.pdf
In this paper we discuss NEMO-BSP protocol and TOR architecture. NEMO protocol was initially not designed to handle anonymity of TOR architecture. Due to some of the unique feature of TOR architecture, the use of TOR architecture has been rapidly increased these days. TOR architecture provides anonymity which other network architectures failed to provides. When using a TOR a user feels safe and has no issue of tracking and packet tracing. Therefore whenever a NEMO user uses TOR architecture there are much vulnerability in network. In this paper we outline those security issues in details which arise when a NEMO user uses TOR architecture. We hope in future those issues will be solved and implemented in future so that a user not only remains anonymous while using TOR but also remains secure from various types of vulnerabilities.
Mohd. Altamash Sheikh. “Security Issues of Network Mobility (NEMO) with Tor Architecture” United International Journal for Research & Technology (UIJRT) 1.4 (2019): 25-29.
Cavine Onyango Oguta. “The Mass Culture of the Freshwater Rotifers Brachionus Rubens Ehrenberg 1838 Using Different Algal Species Diets” United International Journal for Research & Technology (UIJRT) 1.4 (2019): 10-24.
Ataullah Muneeb and Matiullah Shinwari. “Customer Relation Management (CRM) and its Impact on Organizational Performance: A Case of Etisalat Telecommunication in Afghanistan” United International Journal for Research & Technology (UIJRT) 1.4 (2019): 01-09
S M Masiul Azam, Md Shahidul Islam, Parvin Shahanaz, Md Shafiqur Rahman and Sarder Md Shahriar Alam. “Molecular Characterization of Brassica Cultivars through RAPD Markers” United International Journal for Research & Technology (UIJRT) 1.3 (2019): 41-45.
Ishfaq Majid. “ICT in Assessment: A Backbone for Teaching and Learning Process” United International Journal for Research & Technology (UIJRT) 1.3 (2019): 38-40.
More from United International Journal for Research & Technology (20)
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and Suggestions
1. UIJRT | United International Journal for Research & Technology | Volume 01, Issue 02, 2019
All rights are reserved by UIJRT.COM. 26
A Review on Data Protection of Cloud Computing
Security, Benefits, Risks and Suggestions
Guddu Kumar
M.Tech, Computer Science & Engineering, VIT, RKDF University, Bhopal, India
Abstract— While cloud computing is picking up
notoriety, various security and protection issues are
developing that ruin the fast reception of this new
computing worldview. What's more, the advancement
of protective arrangements is lingering behind. To
guarantee a safe and dependable cloud condition it is
fundamental to recognize the restrictions of existing
arrangements and imagine bearings for future research.
Cloud computing changed our general surroundings.
Presently individuals are moving their information to
the cloud since information is getting greater and
should be available from numerous gadgets. In this
manner, putting away the information on the cloud
turns into a standard. In any case, there are numerous
issues that counter information put away in the cloud
beginning from virtual machine which is the intend to
share assets in cloud and completion on cloud
stockpiling itself issues. In this paper, we present those
issues that are keeping individuals from receiving the
cloud and give a study on arrangements that have been
done to limit dangers of these issues. For instance, the
information put away in the cloud should be classified,
safeguarding honesty and accessible. In addition,
sharing the information put away in the cloud among
numerous clients is as yet an issue since the cloud
specialist organization is dishonest to oversee
confirmation and approval. In this paper, we list Cloud
computing security, Benefits, Risks and suggestions for
data security
Keywords— Cloud computing, data security
I. INTRODUCTION
Cloud computing is an informal articulation used to
depict a wide range of computing ideas that include
countless PCs that are associated through an ongoing
correspondence arrange (normally the Internet).[1]
Cloud computing is a language term without a
generally acknowledged non-uncertain logical or
specialized definition. In science, cloud computing is
an equivalent word for conveyed computing over a
system and means the capacity to run a program on
many associated PCs simultaneously. The prevalence
of the term can be ascribed to its utilization in
advertising to sell facilitated benefits in the feeling of
use administration provisioning that run customer
server programming on a remote area.
Fig 1. Cloud computing logical diagram
II CLOUD COMPUTING STRUCTURE
One of the most important parts of cloud computing
strategy is the coming of cloud stages. As its name
recommends, this kind of stage enables designers to
compose applications that keep running in the cloud, or
use administrations given by the cloud, or both. It is
otherwise called on-request stage and stage as an
administration (PaaS). The distinction between how
application stages are utilized today and cloud stages is
that when an advancement group makes an on-
premises application (for example one that will keep
running inside an association), it just needs to compose
a source-code in some kind of programming language.
In the event that the makers of each on-premises
application initially needed to manufacture the majority
of the supporting software that is, directly from the
working frameworks to the constructing agent who
unravels the program, then we would have less
applications in presence today. Also, if each
advancement group that desires to make a cloud
application should initially assemble its own cloud
stage, we would not see many cloud applications
either.
Fortunately, there are a few cloud stage innovations
accessible today [2] permitting whole organizations
and a large number of representatives to run their
computing needs as online leased instruments. The
2. UIJRT | United International Journal for Research & Technology | Volume 01, Issue 02, 2019
All rights are reserved by UIJRT.COM. 27
majority of the preparing and record sparing will be
performed in the cloud, and the clients will connect to
that cloud each day to do their computing work [3].
Cloud computing has three noteworthy premises:
1. Software as a Service
2. Platform as a Service
3. Infrastructure as a Service
1. Software as a Service
Software as a Service (SaaS) is software appropriations
model in which applications are facilitated by a
merchant or specialist organization and are made
accessible to clients over a system, normally the
Internet.
SaaS is turning into an inexorably common
administration conveyance model as fundamental
advancements that help web administrations and
Service Oriented Architecture (SOA) develop, and new
formative approaches, for example, Ajax become well
known. In the mean time, broadband administration has
turned out to be all the more generally accessible to
help client access from more areas around the globe.
SaaS is firmly identified with the Application Service
Provider (ASP) and the on-request software
conveyance models. IDC recognizes two somewhat
extraordinary conveyance models for SaaS [4].
The facilitated Application Management (AM) model
is like ASP: a supplier has industrially accessible
software for clients and conveys it on the Web.
Utilizing the software on-request model, the supplier
gives clients arrange based access to a solitary
duplicate of an application made explicitly for SaaS
circulation. Advantages of the SaaS model include:
• Easier administration
• Automatic updates and patch management
• Compatibility
• Easier collaboration
2. Platform as a Service
Platform as a Service (PaaS) is an approach to lease
equipment, working frameworks, stockpiling, and
system limit on the Internet. The administration
conveyance model permits the client the capacity to
lease virtualized servers and related administrations for
running existing applications or creating and testing
new ones. PaaS is an outgrowth of SaaS, and it is
software conveyance model in which facilitated
software applications are made accessible to clients on
the Internet.
PaaS has a few focal points for designers where
working framework highlights might be changed and
redesigned much of the time. Topographically
appropriated advancement groups may cooperate on
software improvement ventures. Administrations might
be gotten from various sources that cross global limits.
Starting and continuous expenses might be decreased
using foundation administrations from a solitary
merchant rather than keeping up numerous equipment
offices that often perform copy capacities or that
experience the ill effects of contrariness issues.
Generally, costs may likewise be limited by binding
together advancement endeavors [4].
On the disadvantage, PaaS involves some risk of "lock-
in" if offerings require proprietary service interfaces or
development languages. Another potential pitfall is that
the flexibility of offerings may not meet the needs of
some users whose requirements rapidly evolve.
3. Infrastructure as a Service
Infrastructure as a Service (IaaS) once in a while is
alluded to as hardware as a service. It is an
arrangement model in which an organization re-
appropriates the gear used to help operations, including
storage, hardware, servers, and systems administration
components. The service provider owns the equipment
and is responsible for housing, running and
maintenance. The client typically pays on a per-use
basis. The characteristics and components of IaaS
include:
• Value computing service and billing model.
• Computerization of administrative tasks.
• Dynamic scaling.
• Policy-based services.
• Internet connectivity.
Clouds may also be divided into:
1. public: existing widely - any group may subscribe
2. private: facilities built according to cloud
computing principles, but accessible only within a
private network
3. partner: cloud services offered by a provider to a
limited and well-defined number of parties.
In general, the commodity, cost, liability and assurance
of clouds vary according to the following figure:
3. UIJRT | United International Journal for Research & Technology | Volume 01, Issue 02, 2019
All rights are reserved by UIJRT.COM. 28
Fig 2. Feature of Public, Partner & Private Clouds
4. Other Services Offered by Cloud Computing
There are also some other services offered by cloud
computing that include:
• Data as a Service (DaaS): The user’s queries against
the provider’s data base.
• Identity and Policy Management as a Service
(IPMaaS): The provider manages identity and/or access
control policy for consumer
• Network as a Service (NaaS): The provider offers
virtualized networks like a VPN
III. CLOUD COMPUTING SECURITY
In cloud computing, end clients' information put away
in the administration
supplier's server farms as opposed to putting away it on
client's PC. This will make clients worried about their
security.
In addition, moving to brought together cloud services
will bring about client's protection and security breaks
as examined in [5].
Security dangers may happen during the arrangement;
additionally, new dangers are probably going to come
into view.
Cloud condition should protect information
respectability and client security alongside improving
the interoperability over numerous cloud
administration suppliers. Accordingly, we might want
to examine information trustworthiness, secrecy and
accessibility in the cloud. The security identified with
information conveyed on three levels in [5]:
Network Level:
The Cloud Service Provider (CSP) will screen, keep up
and gather data about the firewalls, Intrusion
identification or/and counteractive action frameworks
and information stream inside the network.
Host Level:
It is essential to gather data about framework log
records. So as to know where and when applications
have been logged.
Application Level:
Reviewing application logs, which at that point can be
required for episode reaction or advanced criminology.
At each level, it is required to fulfill security
prerequisites to save information security in the cloud,
for example, classification, trustworthiness and
accessibility as follows:
A. Confidentiality
Ensuring that client information which dwells in the
cloud can't be gotten to by unapproved party. This can
be accomplished through legitimate encryption
methods thinking about the sort of encryption:
symmetric or uneven encryption calculations, likewise
key length and key administration if there should arise
an occurrence of the symmetric figure. As a matter of
fact, it is altogether founded on the CSP. For example,
in [5], Mozy Enterprise utilizes encryption strategies to
ensure client information while Amazon S3 does not. It
additionally relies upon the client mindfulness where
they can encode their data preceding transferring it.
Likewise, The CSP ought to guarantee appropriate
organization of encryption principles utilizing NIST
gauges in [6].
B. Integrity:
Cloud clients ought not just stress over the privacy of
information put away in the cloud yet in addition the
information respectability. Information could be
encoded to give secrecy where it won't ensure that the
information has not been changed while it is living in
the cloud. Chiefly, there are two methodologies which
give uprightness, utilizing Message Authentication
Code (MAC) and Digital Signature (DS). In MAC, it
depends on symmetric key to give a check total that
will be attach to the information. Then again, in the DS
calculation it relies upon the open key structure
(Having open and private pair of keys). As symmetric
calculations are a lot quicker than topsy-turvy
calculations, for this situation, we accept that Message
Authentication Code (MAC) will be the best answer
for give the respectability checking component. Studies
demonstrate that, PaaS and SaaS doesn't give any
honesty insurance, for this situation guaranteeing the
uprightness of information is basic.
C. Availability:
Another issue is accessibility of the information when
it is mentioned through approved clients. The most
dominant method is counteractive action through
4. UIJRT | United International Journal for Research & Technology | Volume 01, Issue 02, 2019
All rights are reserved by UIJRT.COM. 29
maintaining a strategic distance from dangers
influencing the accessibility of the administration or
information. It is exceptionally hard to identify dangers
focusing on the accessibility. Dangers focusing on
accessibility can be either Network based assaults, for
example, Distributed Denial of Service (DDoS)
assaults or CSP accessibility. For instance, Amazon S3
experienced more than two hours' blackout in February
2008 and eight hours' blackout in July 2008. In the
following segment, we will talk about the personality
and access the board practices of the cloud computing
by handling a few conventions, for example, Security
Assertion Markup Language (SAML), Open
Authentication (OAuth) convention and an
examination between these two procedures to finish up
the best solution.
IV. SECURITY BENEFITS OF CLOUD
COMPUTING
It is not really important to rehash the many downpour
backwoods of material which has been composed on
the financial, specialized and structural and
environmental advantages of distributed computing.
Notwithstanding, in the immediate experience of the
individuals from our expert gathering, just as per late
news from 'this present reality', an assessment of the
security dangers of distributed computing must be
adjusted by a survey of its particular security benefits.
Distributed computing can possibly improve security
and versatility. What pursues is a portrayal of the key
manners by which it can contribute.
Put essentially, a wide range of safety efforts are
cheaper when actualized on a bigger scale. Hence, a
similar measure of interest in security purchases better
assurance. This incorporates a wide range of protective
estimates, for example, separating, fix the board,
solidifying of virtual machine occasions and
hypervisors, HR and their administration and
reviewing, equipment and programming repetition,
solid validation, productive job based access control
and united personality the board arrangements of
course, which additionally improves the system
impacts of coordinated effort among different
accomplices associated with guard. Different
advantages of scale include:
Multiple areas: most cloud suppliers have the monetary
assets to recreate content in numerous areas as a matter
of course. This builds repetition and autonomy from
disappointment and gives a degree of debacle
recuperation out-of-the-box.
Edge systems: stockpiling, preparing and conveyance
closer to the system edge mean administration
unwavering quality and quality is expanded generally
and nearby system issues are less inclined to have
worldwide reactions.
Improved practicality of reaction: bigger to
occurrences: well-run bigger scale frameworks, for
instance because of early recognition of new malware
arrangements, can grow increasingly successful and
effective episode reaction capacities.
Threat the executives: cloud suppliers can likewise
bear to procure pros in managing explicit security
dangers, while littler organizations can just manage the
cost of few generalists.
The advantages of cloud computing can be reasonably
accomplished by joining forces with cutting edge
private cloud computing suppliers in a manner that
doesn't endanger your organization's security. Here are
5 advantages of a top cloud computing security
solution:
1. Protection against DDoS-Distributed disavowal of
administration assaults are on the ascent, and a top
cloud computing security arrangement centers around
measures to stop tremendous measures of traffic went
for an organization's cloud servers. This involves
checking, retaining and scattering DDoS assaults to
limit risk.
2. Data security-In the consistently expanding time of
information ruptures, a top cloud computing security
arrangement has security conventions set up to ensure
delicate data and exchanges. This keeps an outsider
from listening stealthily or messing with information
being transmitted.
3. Regulatory compliance- Top cloud computing
security arrangements help organizations in directed
ventures by overseeing and keeping up upgraded
frameworks for consistence and to ensure individual
and money related information.
4. Flexibility- A cloud computing arrangement
furnishes you with the security you need whether
you're turning up or down limit. You have the
adaptability to keep away from server crashes during
high traffic periods by scaling up your cloud
arrangement. At that point when the high traffic is
finished, you can downsize down to lessen costs.
5. High accessibility and backing An accepted
procedures cloud computing security arrangement
offers consistent help for an organization's advantages.
This incorporates live observing 24 hours per day, 7
days seven days, and each day of the year.
5. UIJRT | United International Journal for Research & Technology | Volume 01, Issue 02, 2019
All rights are reserved by UIJRT.COM. 30
Redundancies are worked in to guarantee your
organization's site and applications are constantly on
the web.
A top-level cloud computing security arrangement
gives organizations the accessibility, unwavering
quality, and security they have to direct business in a
worldwide commercial center. Propelled cybersecurity
highlights join with physical framework to make a far
reaching, secure answer for your cloud computing
needs.
V. SECURITY BENEFITS OF RISK
1. The following points should be noted in relation to
the descriptions of risk below:
2. Risk ought to consistently be comprehended in
connection to by and large business opportunity
and hunger for risk – some of the time risk is
repaid by circumstance.
3. Cloud services are not just about advantageous
capacity, available by various gadgets, however
incorporate significant advantages, for example,
increasingly helpful correspondence and moment
multi-point coordinated effort. Consequently, a
relative analysis needs to look at not just the risks
of putting away information in better places (on
premises v the cloud) yet in addition the risks
when on premises-information put away on
premises – for example a spreadsheet - is
messaged to different people for their
commitments, against the security issues of a
spreadsheet put away in the cloud and open to joint
effort between those people. Subsequently, the
risks of utilizing cloud registering ought to be
contrasted with the risks of remaining with
conventional arrangements, for example, work
area based models.
4. The level of risk will as a rule differ fundamentally
with the sort of cloud engineering being
considered.
5. It is workable for the cloud client to move risk to
the cloud supplier and the risks ought to be
considered against the money saving advantage
got from the services. Anyway not all risks can be
moved: if a risk prompts the disappointment of a
business, genuine harm to notoriety or lawful
ramifications, it is hard or incomprehensible for
some other gathering to make up for this harm.
6. The risk analysis in this paper applies to cloud
innovation. It doesn't have any significant bearing
to a particular cloud figuring offering or
organization. This paper isn't intended to supplant
a venture explicit hierarchical risk evaluation.
7. The level of risks is communicated from the point
of view of the cloud client. Where the cloud
supplier perspective is considered, this is
unequivocally expressed.
V. SUGGESTION FOR DATA SECURITY
With the expansion in information volumes,
information taking care of has turned into all the rage.
As associations move to the cloud, there is a higher
accentuation guaranteeing everything is protected and
secure, and that there is no risk of information hacking
or ruptures. Since the cloud enables individuals to work
without equipment and programming ventures, clients
can pick up adaptability and information spryness. Be
that as it may, since the Cloud is regularly shared
between a ton of clients, security turns into a quick
worry for Cloud owners.
Security Issues Within the Cloud:
Cloud merchants give a layer of security to client's
information. In any case, it is as yet insufficient since
the privacy of information can regularly be at risk.
There are different kinds of assaults, which range from
secret word speculating assaults and man-in-the-center
assaults to insider assaults, shoulder surfing assaults,
and phishing assaults. Here is a rundown of the
security challenges which are available inside the
cloud.
Data Protection and Misuse:
At the point when various associations utilize the cloud
to store their information, there is regularly a risk of
information abuse. To evade this risk, there is an up
and coming need to verify the information stores. To
accomplish this undertaking, one can utilize
confirmation and limit access control for the cloud's
information.
Locality:
Inside the cloud world, information is frequently
appropriated over a progression of districts; it is very
testing to locate the precise area of the information
stockpiling. Be that as it may, as information is moved
starting with one nation then onto the next, the
standards administering the information stockpiling
likewise change; this brings consistence issues and
information security laws into the image, which relate
to the capacity of information inside the cloud. As a
cloud specialist co-op, the specialist organization needs
to illuminate the clients regarding their information
stockpiling laws, and the careful area of the data
storage server.
Integrity:
The framework should be fixed in such a way so to
give security and access limitations. At the end of the
day, information access should lie with approved staff
6. UIJRT | United International Journal for Research & Technology | Volume 01, Issue 02, 2019
All rights are reserved by UIJRT.COM. 31
as it were. In a cloud situation, information
trustworthiness ought to be kept up consistently to stay
away from any inborn information misfortune. Aside
from confining access, the authorizations to make
changes to the information ought to be restricted to
explicit individuals, so that there is no far reaching
access issue at a later stage.
Access:
Information security approaches concerning the
entrance and control of information are fundamental
over the long haul. Approved information proprietors
are required to give part access to people so everybody
gets just the required access for parts of the information
put away inside the information bazaar. By controlling
and confining access, there is a great deal of control
and information security which can be imposed to
guarantee maximums security for the put away
information.
Confidentiality:
There is a ton of delicate information which may be put
away in the cloud. This information must have
additional layers of security on it to diminish the odds
of breaks and phishing assaults; this should be possible
by the specialist co-op, just as the association. Be that
as it may, as a safety measure, information
classification ought to be of most extreme need for
delicate material.
Breaches:
Ruptures inside the cloud are not unheard.
Programmers can rupture security parameters inside
the cloud, and take the information which may
somehow or another be viewed as secret for
associations. In actuality, a rupture can be an interior
assault, so associations need to lay specific
accentuation in following representative activities to
stay away from any undesirable assaults on put away
information.
Storage:
For associations, the information is being put away and
made accessible for all intents and purposes.
Notwithstanding, for specialist co-ops, it is important
to store the information in physical foundations, which
makes the information defenseless and helpful for
physical assaults.
These are a portion of the security issues which come
as a piece of the cloud condition. Be that as it may,
these are not actually hard to survive, particularly with
the accessible degrees of mechanical assets nowadays.
There is a ton of accentuation on guaranteeing greatest
security for the put away information so it consents to
the standards and guidelines, just as the association's
inside consistence approaches.
VI. RELATED WORKS
Cloud computing has changed the IT idea into
administration [7], [10], [11], [12], [14], [20] with
building up a creative PC administration redemption
model for the IT improvement necessity. It has
improved IT execution capacities in the public eye and
has remade every IT developments influencing the
execution, unwavering quality, effectiveness, and
security of the cloud information framework.
Notwithstanding, as the highlights of Cloud
Assignment models contrast broadly initiating the
current usage of the specialist organization, which must
be progressively worried about the information
insurance frameworks.
Security is one of the real difficulties confronting the
cloud condition. The 88% of cloud purchasers
solicitation access to their information and solicitation
more noteworthy thought to turns around, for example,
conceivable cloud customers [8], [9], [18], [21]
physical area, information the executives and security
organization of their cloud information in virtual
situations.
This demonstrates clients perceive clearness and
security over cloud data. The specialist organization
might be completely constrained by dealing with the
cloud administration of a cloud administration, yet
some cloud specialist co-ops don't enable the client to
utilize cloud data in the cloud.
Wei Li et. al. [9] presents ‘Property Based Encryption
(ABE)’ is viewed as a competent cryptographic
administration device that guarantees direct control of
the information proprietor on information in open
cloud stockpiling.
The previous ABE tasks have the sole intensity of
dealing with the whole property set, which gets one-
point hindrances both security and execution. It runs a
multi-exclusive CP-AE access control plan for open
cloud stockpiling named TMACS, in which numerous
officials together deal with the uniform properties. As
far as possible multi-tyrant TMACS proposes the
compelling usage of the customary multi-legitimate
undertaking with TMACS.
This makes a half and half undertaking that is fitting in
the genuine circumstance, in which the trademark sets
comprise of various attributes and highlights from
different specialists mutually play out the whole
property subdivision. It doesn't clarify the explanations
behind choosing the ace key for the objective incentive
7. UIJRT | United International Journal for Research & Technology | Volume 01, Issue 02, 2019
All rights are reserved by UIJRT.COM. 32
for shrouded sharing, include set, and focused on
correspondence plan conventions.
V.Chang et. al [11] proposed a CCAF multi-layer
security ensures ongoing information, and it has three
layers of security: 1) ‘firewall and access control’; 2)
‘Distinguishing proof Management and Intervention
Prevention’, and 3) ‘Transformation Encryption’. It has
taken two arrangements of moral hacking tests in
interest testing. The CCAF multi-layer security shields
information from expedient information development
in view of security abuses. This strategy gives ongoing
assurance to every one of the information, forestalls
more dangers and expels the methodical framework in
the server farm and gives a far reaching clarification of
cloud security upheld by an intelligible structure that
influences the exhibition of client got to support,
business procedure displaying. It very well may be
additionally assessed progressively situations to
quantify productivity.
M. Anisettiet. Al [10] gives an intense and durable
assurance procedure dependent on confirmation, which
totally resolves cloud prerequisites. The Authentication
Scheme gives an answer for the administration of the
endorsement lifecycle, which is a robotized and
expanding technique for accreditation changing the
cloud multi-layer and elements nature. Each bit of
cloud carries on true to form and builds the certainty of
cloud buyers as indicated by their necessities. This
characterizes a computerized way to deal with
dependability examination among prerequisites and
models, in light of the chain's trust upheld by the
affirmation plot. The task does not consider
administration blends dependent on offshoot
administration affirmation and cost-proficient
accreditation to empower a confirmation based mix
that supports cost streamlining in favor of Cloud
Providers.
S. Linset. Al [13] constantly investigates dynamic
affirmation prerequisites to guarantee secure and
dependable cloud services and introduces solid cloud
administration accreditations. Cloud administration
frameworks and procedures are generally received, and
utilitarian accreditation of cloud services is in fact and
monetarily feasible. Most purchasers request
straightforward, solid guaranteed cloud services, and
the supplier can begin opening up for dynamic
certifications.
Chi Chen et. Al [16] proposes a hunt instrument in the
cipher text cloud stockpiling. It investigates the trouble
of protecting a semantic relationship among different
basic reports in connection to the encoded archives and
gives a strategy to improve the exhibition of the
semantic pursuit. The proposed strategy has a favorable
position over the ordinary technique for positioning
protection and the importance of the recovered records,
as it breaks down hunt fitness and security underneath
two appreciated risk designs. The work is centered
uniquely around information security however the
viability and availability of different inquiry clients are
not talked about.
S. Wang et. Al [19] presents has overhauled the
characteristic based information sharing system in
cloud computing. Propelled key convention resolves
real escrow issues. It presents the idea of articulation,
gave to improve the trait articulation, which extends
articulation from the double as well as decreases the
multifaceted nature of access approach. KA and CSP
administrators and noxious framework untouchables
increment information protection and privacy in the
cloud framework against semi-unwavering quality of
the KA and CSP. What's more, improvement of trait
articulation is an additional trademark, which cannot
just depict the state qualities of the discretionary
however lessens the intricacy of the confirmation
strategy. Information protection and security are
guaranteed in the proposition however information
proprietors and information solicitation can't be
evaluated by the trust. This should be possible to assess
trust the board models for better cloud security.
Joseph K. Liu et. Al [17] gave a ‘two-digit information
assurance’ report for a cloud insurance framework,
which enables the sender of the information to shroud
the beneficiary's data, however the beneficiary is his
protection key and security to get client data. The
arrangement expands the security of the data and gives
a gadget recuperation, so that if the gadget is pulled
back, the equal ciphertext won't be precisely identified
by any information proprietor from the cloud server.
The work centers to a great extent around the
classification of information and gadget control,
however it doesn't assess confided in clients and
distorts the client reviews.
S.Subbalakshmi , Dr. K.Madhavi [22] Data protection
and security are the fundamental worries of cloud
computing. Huge information is an accumulation of
huge volumes of information that can't be taken care of
by customary design. To beat this, the Cloud
Computing engineering is being utilized by numerous
associations to store such volumes of information.
Anyway the significant concern is in regards to
information protection, security and access controls. In
this paper, issues identified with information
stockpiling security and access control are
9. UIJRT | United International Journal for Research & Technology | Volume 01, Issue 02, 2019
All rights are reserved by UIJRT.COM. 34
continuous cloud service certification" IEEE
Transactions On Services Computing, 2016.
[11] V. Chang, M. Ramachandran, "Towards achieving
Data Security with the Cloud Computing Adoption
Framework", IEEE Transactions on Services
Computing, 2015.
[12] B. Dong, R. Liu, Hui Wang, "Trust-but-Verify:
Verifying Result Correctness of Outsourced
Frequent Itemset Mining In Data-mining-as-a-
service Paradigm", IEEE Transactions on Services
Computing, 2015.
[13] S. LIns, P. Grochol, S. Schneider, and A. Sunyaev,
"Dynamic Certification of Cloud Services: Trust,
but Verify", IEEE Computer and Reliability
Societies, 1540-7993/16, 2016.
[14] T. Noor, Q. Sheng, L. Yao, S. Dustdar and A.
Ngu. "CloudArmor: Supporting Reputation-based
Trust Management for Cloud Services", IEEE
transactions on parallel and distributed systems,
Vol. 27, no. 2, Pgs. 367-380, 2015.
[15] M. Xiao, M. Wang, X. Liu, and J. Sun, "Efficient
distributed access control for big data in clouds",
Proc. - IEEE INFOCOM, vol. 20, no. BigSecurity,
pp. 202-207, 2015.
[16] C. Chen, X. Zhu, P. Shen, J. Hu, S. Guo, Z. Tari,
A. Y. Zomaya, "An Efficient Privacy-Preserving
Ranked Keyword Search Method", IEEE
Transactions On Parallel And Distributed Systems,
Vol. 27, No. 4, 2016.
[17] J. K. Liu, K. Liang, W. Susilo, J. Liu, Y. Xiang,
"Two-Factor Data Security Protection Mechanism
for Cloud Storage System", IEEE Transactions on
Computers, 2015.
[18] T. Yang, P. Shen, X. Tian, C. Chen, "A Fine-
Grained Access Control Scheme for Big Data
Based on Classification Attributes", IEEE 37th
International Conference on Distributed
Computing Systems Workshops (ICDCSW) Pgs.
238 - 245, 2017.
[19] S. Wang, K. Liang, Joseph K. Liu, J. Chen,
JianpIng Yu, W. Xie, "Attribute-Based Data
Sharing Scheme Revisited In Cloud Computing",
IEEE Transactions on Information Forensics and
Security, Vol. 11, 2016.
[20] A. Bonguet and M. Bellaiche, "A survey of
Denial-of- Service and Distributed Denial of
Service attacks and defenses in cloud computing",
Future Internet, vol. 9, no. 3, 2017.
[21] T. Pasquier, J.Singh, J. Powles, D. Eyers, M.
Seltzer, J. Bacon, "Data provenance to audit
compliance with the privacy policy in the Internet
of Things Personal and Ubiquitous Computing",
Vol. 22, pp 333-344, 2018.
[22] S.Subbalakshmi , Dr. K.Madhavi, “Security
challenges of Big Data storage in Cloud
environment: A Survey” International Journal of
Applied Engineering Research ISSN 0973-4562
Volume 13, Number 17 (2018) pp. 13237-13244