Cloud computing is an anthology in which one or more computers are connected in a network. Cloud computing is a cluster of lattice computing, autonomic computing and utility computing. Cloud provides an on demand services to the users. Many numbers of users access the cloud to utilize the cloud resources. The security is one the major problem in cloud computing. Hence security is a major issue in cloud computing. Providing security is a major requirement of cloud computing. The study enclose all the security issues and attack issues in cloud computing.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
In this paper we are study-ing about cloud computing, their types, need to use cloud computing. We also study the architecture of the mobile cloud computing. So we included new techniques for backup and restoring data from mobile to cloud. Here we proposed to apply some compres-sion technique while backup and restore data from Smartphone to cloud and cloud to the Smartphone.
Performance Enhancement of Cloud Computing using ClusteringEditor IJMTER
Cloud computing is an emerging infrastructure paradigm that allows efficient maintenance
of cloud with efficient uses of servers. Virtualization is a key element in cloud environment as it
provides distribution of computing resources. This distribution results in cost and energy reduction,
thus making efficient utilization of physical resources. Thus resource sharing and use of
virtualization allows improved performance for demanding scientific computing workloads. Number
of data centers and physical servers are underutilized so they are used inefficiently. So performance
evaluation and its enhancement in virtualized environment like public and private cloud are the
challenging issues. Performance of cloud environment is dependent on CPU & memory utilization,
Network and I/O disk operations. In order to improve the performance of the virtualization with
cloud computing, one of the solutions is to allow highly available data in the cluster form. Thus
replicas are available at each data centers and are highly available. In the proposed work, the I/O
parameters are chosen for increasing the performance in this domain. This enhancement can be
achieved through the clustering and caching technologies. The use of technology for data centers
clustering is proposed in this paper. Thus performance and scalability can be improved by reducing
the number of hits to the cloud database.
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
Cloud computing provides the facility to access shared resources and common support which contributes services on
demand over the network to perform operations that meet changing business needs. A cloud storage system, consisting of a collection
of storage servers, affords long-term storage services over the internet. Storing the data in a third party cloud system cause serious
concern over data confidentiality, without considering the local infrastructure limitations, the cloud services allow the user to enjoy the
cloud applications. As the different users may be working in the collaborative relationship, the data sharing becomes significant to
achieve productive benefit during the data accessing. The existing security system only focuses on the authentication; it shows that
user’s private data cannot be accessed by the fake users. To address the above cloud storage privacy issue shared authority based
privacy-preserving authentication protocol is used. In the SAPA, the shared access authority is achieved by anonymous access request
and privacy consideration, attribute based access control allows the user to access their own data fields. To provide the data sharing
among the multiple users proxy re-encryption scheme is applied by the cloud server. The privacy-preserving data access authority
sharing is attractive for multi-user collaborative cloud applications.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
In this paper we are study-ing about cloud computing, their types, need to use cloud computing. We also study the architecture of the mobile cloud computing. So we included new techniques for backup and restoring data from mobile to cloud. Here we proposed to apply some compres-sion technique while backup and restore data from Smartphone to cloud and cloud to the Smartphone.
Performance Enhancement of Cloud Computing using ClusteringEditor IJMTER
Cloud computing is an emerging infrastructure paradigm that allows efficient maintenance
of cloud with efficient uses of servers. Virtualization is a key element in cloud environment as it
provides distribution of computing resources. This distribution results in cost and energy reduction,
thus making efficient utilization of physical resources. Thus resource sharing and use of
virtualization allows improved performance for demanding scientific computing workloads. Number
of data centers and physical servers are underutilized so they are used inefficiently. So performance
evaluation and its enhancement in virtualized environment like public and private cloud are the
challenging issues. Performance of cloud environment is dependent on CPU & memory utilization,
Network and I/O disk operations. In order to improve the performance of the virtualization with
cloud computing, one of the solutions is to allow highly available data in the cluster form. Thus
replicas are available at each data centers and are highly available. In the proposed work, the I/O
parameters are chosen for increasing the performance in this domain. This enhancement can be
achieved through the clustering and caching technologies. The use of technology for data centers
clustering is proposed in this paper. Thus performance and scalability can be improved by reducing
the number of hits to the cloud database.
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
Cloud computing provides the facility to access shared resources and common support which contributes services on
demand over the network to perform operations that meet changing business needs. A cloud storage system, consisting of a collection
of storage servers, affords long-term storage services over the internet. Storing the data in a third party cloud system cause serious
concern over data confidentiality, without considering the local infrastructure limitations, the cloud services allow the user to enjoy the
cloud applications. As the different users may be working in the collaborative relationship, the data sharing becomes significant to
achieve productive benefit during the data accessing. The existing security system only focuses on the authentication; it shows that
user’s private data cannot be accessed by the fake users. To address the above cloud storage privacy issue shared authority based
privacy-preserving authentication protocol is used. In the SAPA, the shared access authority is achieved by anonymous access request
and privacy consideration, attribute based access control allows the user to access their own data fields. To provide the data sharing
among the multiple users proxy re-encryption scheme is applied by the cloud server. The privacy-preserving data access authority
sharing is attractive for multi-user collaborative cloud applications.
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...Eswar Publications
Cloud computing is an emerging technology which could replace long-established IT systems. Cloud computing made big strides forward in 2013, and if a host of industry experts proves correct, it will make even bigger advances in 2014. As Forbes, CxoToday, GigaOM, and other news services that cover technology report, the experts forecast many more companies joining clouds or creating their own; new professional services emerging to manage the clouds and the data within them; and the clouds’ expansion transforming IT and work life in general trough out the world. Cloud computing makes it possible for an organizations’ IT to be more malleable,
save costs and process information and data faster than with long-established IT. Cloud computing is the operating of programs and storage of data and files in an online network, not on physical disks and hardware’s. Cloud computing arises from the IT technicians desire to add another layer of separation in processing information. Cloud Vendor Evaluation & Selection offering leverages the database to accelerate the identification and screening of candidate vendors in four-step vendor evaluation and selection process.
Security of Data in Cloud Environment Using DPaaSIJMER
The rapid development of cloud computing is giving way to more cloud services, due to
which security of services of cloud especially data confidentiality protection, becomes more critical.
Cloud computing is an emerging computing style which provides dynamic services, scalable and payper-use.
Although cloud computing provides numerous advantages, a key challenge is how to ensure
and build confidence that the cloud can handle user data securely. This paper highlights some major
security issues that exist in current cloud computing environments. The status of the development of
cloud computing security, the data privacy analysis, security audit, information check and another
challenges that the cloud computing security faces have been explored. The recent researches on data
protection regarding security and privacy issues in cloud computing have partially addressed some
issues. The best option is to build data-protection solutions at the platform layer. The growing appeal
of data protection as a service is that it enables to access just the resources you need at minimal
upfront expense while providing the benefits of enterprise-class data protection capabilities. The
paper proposes a solution to make existing developed applications for simple cloud Systems
compatible with DPaaS. The various security challenges have been highlighted and the various
necessary metrics required for designing DPaaS have been investigated.
CLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM cscpconf
Cloud computing is a new emerging system which offers information technologies via Internet. Clients use services they need when they need and at the place they want and pay only for what they have consumed. So, cloud computing offers many advantages especially for business. A deep study and understanding of this emerging system and the inherent components help a lot in identifying what should we do in order to improve its performance. In this work, we present first cloud computing and its components then we describe an idea which attempts to optimize the management of cloud computing system that are composed of many data centers.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...Sushil kumar Choudhary
Cloud computing is a network-based environment that focuses on sharing computations, Cloud computing networks access to a shared pool of configurable networks, servers, storage, service, applications & other important Computing resources. In modern era of Information Technology, the accesses to all information about the important activities of the related fields. In this paper discuss the advantages, disadvantages, characteristics, challenge, deployment model, cloud service model, cloud service provider & various applications areas of cloud computing such as small & large scale (manufacturing, automation, television, broadcast, constructions industries), Geographical Information system (GIS), Military intelligence fusion (MIS), business management, banking, Education, healthcare, Agriculture sector, E-Governance, project planning, cloud computing in family etc.
Cloud Computing is a versatile technology that can support a broad-spectrum of applications. The low cost of cloud computing and its dynamic scaling renders it an innovation driver for small companies, particularly in the developing world. Cloud deployed enterprise resource planning (ERP), supply chain management applications (SCM), customer relationship management (CRM) applications, medical applications and mobile applications have potential to reach millions of users. In this paper, we explore the different concepts involved in cloud computing. Leveraging our experiences on various clouds, we examine clouds from technical, and service aspects. We highlight some of the opportunities in cloud computing, underlining the importance of clouds and showing why that technology must succeed. Finally, we discuss some of the issues that this area should deal with. The paper aims to provide a means of understanding the model and exploring options available for complementing your technology and infrastructure needs.
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
Cloud computing provides the facility to access shared resources and common support which contributes services on demand over the network to perform operations that meet changing business needs. A cloud storage system, consisting of a collection of storage servers, affords long-term storage services over the internet. Storing the data in a third party cloud system cause serious concern over data confidentiality, without considering the local infrastructure limitations, the cloud services allow the user to enjoy the cloud applications. As the different users may be working in the collaborative relationship, the data sharing becomes significant to achieve productive benefit during the data accessing. The existing security system only focuses on the authentication; it shows that user’s private data cannot be accessed by the fake users. To address the above cloud storage privacy issue shared authority based privacy-preserving authentication protocol is used. In the SAPA, the shared access authority is achieved by anonymous access request and privacy consideration, attribute based access control allows the user to access their own data fields. To provide the data sharing among the multiple users proxy re-encryption scheme is applied by the cloud server. The privacy-preserving data access authority sharing is attractive for multi-user collaborative cloud applications.
Fault Tolerance in AWS Distributed Cloud ComputingCaner KAYA
Abstract— The cloud computing enable information technologies solutions by using the visual machines to provide resource-sharing and using on demand basis; so within this complex, this area is becoming more attractive for researching. Upon the rapid development of these technologies, the fault tolerance of cloud computing has become one of the most important topic for information technologies. This requirement has become forefront since, this system needs reliability and must be ready all the time. This case-study, review the techniques that protect the cloud computing and user systems from process fault. One of the indications is as shown below, that, the cloud computing is prone to create faults. The main goals of the fault tolerance are to protect financial loses, to achieve the restoration of the system. The case study has review the scenario that the fault, repetitions could be solved by checkpoints and back-ups. The Amazon AWS is shown asan example for the fault-tolerance.
Keywords- Cloud Computing; Fault Tolerance; Dependability ; Availability ; Redundancy; Human Factor: Replication ;Amazon Web Services.
A detailed study of cloud computing is presented. Starting from its basics, the characteristics and different modalities
are dwelt upon. Apart from this, the pros and cons of cloud computing is also highlighted. Apart from this, service
models of cloud computing are lucidly highlighted.
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTSijujournal
In computer networks attacks plays a vital role. It also degrades a cloud services nowadays. The attacks
reduce the quality of services in the computer networks as well as cloud platforms. The attack that makes
services engaged to the intended users. For effective use of cloud computing we need to reduce the attacks
vulnerabilities and improve the security. This study discuss about the different types of attacks that affects
the cloud environments and also possible mitigation techniques to reduce the attacks. Issue mitigation
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTSijujournal
In computer networks attacks plays a vital role. It also degrades a cloud services nowadays. The attacks
reduce the quality of services in the computer networks as well as cloud platforms. The attack that makes
services engaged to the intended users. For effective use of cloud computing we need to reduce the attacks
vulnerabilities and improve the security. This study discuss about the different types of attacks that affects
the cloud environments and also possible mitigation techniques to reduce the attacks. Issue mitigation
A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection ...Eswar Publications
Cloud computing is an emerging technology which could replace long-established IT systems. Cloud computing made big strides forward in 2013, and if a host of industry experts proves correct, it will make even bigger advances in 2014. As Forbes, CxoToday, GigaOM, and other news services that cover technology report, the experts forecast many more companies joining clouds or creating their own; new professional services emerging to manage the clouds and the data within them; and the clouds’ expansion transforming IT and work life in general trough out the world. Cloud computing makes it possible for an organizations’ IT to be more malleable,
save costs and process information and data faster than with long-established IT. Cloud computing is the operating of programs and storage of data and files in an online network, not on physical disks and hardware’s. Cloud computing arises from the IT technicians desire to add another layer of separation in processing information. Cloud Vendor Evaluation & Selection offering leverages the database to accelerate the identification and screening of candidate vendors in four-step vendor evaluation and selection process.
Security of Data in Cloud Environment Using DPaaSIJMER
The rapid development of cloud computing is giving way to more cloud services, due to
which security of services of cloud especially data confidentiality protection, becomes more critical.
Cloud computing is an emerging computing style which provides dynamic services, scalable and payper-use.
Although cloud computing provides numerous advantages, a key challenge is how to ensure
and build confidence that the cloud can handle user data securely. This paper highlights some major
security issues that exist in current cloud computing environments. The status of the development of
cloud computing security, the data privacy analysis, security audit, information check and another
challenges that the cloud computing security faces have been explored. The recent researches on data
protection regarding security and privacy issues in cloud computing have partially addressed some
issues. The best option is to build data-protection solutions at the platform layer. The growing appeal
of data protection as a service is that it enables to access just the resources you need at minimal
upfront expense while providing the benefits of enterprise-class data protection capabilities. The
paper proposes a solution to make existing developed applications for simple cloud Systems
compatible with DPaaS. The various security challenges have been highlighted and the various
necessary metrics required for designing DPaaS have been investigated.
CLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM cscpconf
Cloud computing is a new emerging system which offers information technologies via Internet. Clients use services they need when they need and at the place they want and pay only for what they have consumed. So, cloud computing offers many advantages especially for business. A deep study and understanding of this emerging system and the inherent components help a lot in identifying what should we do in order to improve its performance. In this work, we present first cloud computing and its components then we describe an idea which attempts to optimize the management of cloud computing system that are composed of many data centers.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...Sushil kumar Choudhary
Cloud computing is a network-based environment that focuses on sharing computations, Cloud computing networks access to a shared pool of configurable networks, servers, storage, service, applications & other important Computing resources. In modern era of Information Technology, the accesses to all information about the important activities of the related fields. In this paper discuss the advantages, disadvantages, characteristics, challenge, deployment model, cloud service model, cloud service provider & various applications areas of cloud computing such as small & large scale (manufacturing, automation, television, broadcast, constructions industries), Geographical Information system (GIS), Military intelligence fusion (MIS), business management, banking, Education, healthcare, Agriculture sector, E-Governance, project planning, cloud computing in family etc.
Cloud Computing is a versatile technology that can support a broad-spectrum of applications. The low cost of cloud computing and its dynamic scaling renders it an innovation driver for small companies, particularly in the developing world. Cloud deployed enterprise resource planning (ERP), supply chain management applications (SCM), customer relationship management (CRM) applications, medical applications and mobile applications have potential to reach millions of users. In this paper, we explore the different concepts involved in cloud computing. Leveraging our experiences on various clouds, we examine clouds from technical, and service aspects. We highlight some of the opportunities in cloud computing, underlining the importance of clouds and showing why that technology must succeed. Finally, we discuss some of the issues that this area should deal with. The paper aims to provide a means of understanding the model and exploring options available for complementing your technology and infrastructure needs.
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
Cloud computing provides the facility to access shared resources and common support which contributes services on demand over the network to perform operations that meet changing business needs. A cloud storage system, consisting of a collection of storage servers, affords long-term storage services over the internet. Storing the data in a third party cloud system cause serious concern over data confidentiality, without considering the local infrastructure limitations, the cloud services allow the user to enjoy the cloud applications. As the different users may be working in the collaborative relationship, the data sharing becomes significant to achieve productive benefit during the data accessing. The existing security system only focuses on the authentication; it shows that user’s private data cannot be accessed by the fake users. To address the above cloud storage privacy issue shared authority based privacy-preserving authentication protocol is used. In the SAPA, the shared access authority is achieved by anonymous access request and privacy consideration, attribute based access control allows the user to access their own data fields. To provide the data sharing among the multiple users proxy re-encryption scheme is applied by the cloud server. The privacy-preserving data access authority sharing is attractive for multi-user collaborative cloud applications.
Fault Tolerance in AWS Distributed Cloud ComputingCaner KAYA
Abstract— The cloud computing enable information technologies solutions by using the visual machines to provide resource-sharing and using on demand basis; so within this complex, this area is becoming more attractive for researching. Upon the rapid development of these technologies, the fault tolerance of cloud computing has become one of the most important topic for information technologies. This requirement has become forefront since, this system needs reliability and must be ready all the time. This case-study, review the techniques that protect the cloud computing and user systems from process fault. One of the indications is as shown below, that, the cloud computing is prone to create faults. The main goals of the fault tolerance are to protect financial loses, to achieve the restoration of the system. The case study has review the scenario that the fault, repetitions could be solved by checkpoints and back-ups. The Amazon AWS is shown asan example for the fault-tolerance.
Keywords- Cloud Computing; Fault Tolerance; Dependability ; Availability ; Redundancy; Human Factor: Replication ;Amazon Web Services.
A detailed study of cloud computing is presented. Starting from its basics, the characteristics and different modalities
are dwelt upon. Apart from this, the pros and cons of cloud computing is also highlighted. Apart from this, service
models of cloud computing are lucidly highlighted.
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTSijujournal
In computer networks attacks plays a vital role. It also degrades a cloud services nowadays. The attacks
reduce the quality of services in the computer networks as well as cloud platforms. The attack that makes
services engaged to the intended users. For effective use of cloud computing we need to reduce the attacks
vulnerabilities and improve the security. This study discuss about the different types of attacks that affects
the cloud environments and also possible mitigation techniques to reduce the attacks. Issue mitigation
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTSijujournal
In computer networks attacks plays a vital role. It also degrades a cloud services nowadays. The attacks
reduce the quality of services in the computer networks as well as cloud platforms. The attack that makes
services engaged to the intended users. For effective use of cloud computing we need to reduce the attacks
vulnerabilities and improve the security. This study discuss about the different types of attacks that affects
the cloud environments and also possible mitigation techniques to reduce the attacks. Issue mitigation
Cloud computing challenges with emphasis on amazon ec2 and windows azureIJCNCJournal
Cloud Computing has received much attention by the IT-Business world. As compared to the common
computing platforms, cloud computing is more flexible in supporting real-time computation and is
considered a more powerful model for hosting and delivering services over the Internet. However, since
cloud computing is still at its infancy, it faces many challenges that stand against its growth and spread.
This article discusses some challenges facing cloud computing growth and conducts a comparison study
between Amazon EC2 and Windows Azure in dealing with such challenges. It concludes that Amazon EC2
generally offers better solutions than Windows Azure. Nevertheless, the selection between them depends on
the needs of customers.
Cloud Computing Basics Features and Servicesijtsrd
Cloud computing is an on demand service in which distributed resources, information, software and other devices are provided according to the client's requirement at specific time 1 . Cloud computing involves deploying groups of remote servers and software networks that allow centralized data storage and online access to computer services or resources. In this paper, we explore the different services in different computing platforms and applications. Cloud computing is a service, which offers customers to work over the internet 2 . Kyi Pyar | Me Me Khaing "Cloud Computing Basics: Features and Services" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd27960.pdfPaper URL: https://www.ijtsrd.com/computer-science/distributed-computing/27960/cloud-computing-basics-features-and-services/kyi-pyar
What is Cloud Computing and, How does the cloud work?
Cloud Computing
This article is intended to discuss cloud computing, cloud computing basics, how does cloud computing work, cloud services, and what is cloud computing? Study of cloud computing and job opportunities after completing cloud computing course.
What is Cloud Computing and, How does the cloud work?
The term “cloud” is used as a substitute for the “internet”. Cloud computing points to any hardware or software like networks, software, analytics, servers, storage, databases, and intelligence provided over the internet (cloud) by any service provider.
Data, software, and source codes are often stored on hard drives, which is quite risky since difficult situations may arise such as hard disk crashes, data corruption, and eventual loss of the entire resources to work with. A cloud computing service provides various server, software, storage, and application services over the Internet so that they should be safe. They can be configured to handle any size of access or traffic and can scale up and down according to the volume and, frequency of requirement. Thus cloud computing is the delivery of different services through the Internet including different servers, software, storage, and applications. In other words, using cloud computing, customers can access software, infrastructure, platforms, devices, and other resources over the internet.
Customers can easily utilize these services available in the cloud without any prior knowledge of how to manage the resources involved.
Large companies such as Google, Amazon, IBM, Sun, Cisco, Dell, HP, Intel, Novell, and Oracle are investing in cloud computing to provide individuals and businesses with a variety of cloud-based solutions.
For example, Google Cloud is a collection of public cloud services provided by Google. All Application development is done on Google hardware. These include Google Compute Engine, App Engine, Google Cloud Storage, and Google Container Engine.
Cloud storage utilizes data centers with massive computer servers that store data and access it online through the internet. The users can remotely upload and store their content and retrieve it whenever they need it.
Advantages of cloud computing.
Businesses around the world are moving away from traditional on-premises services as cloud computing becomes more popular. In recent years, cloud-based services have radically changed the way businesses do business, enabling them to use information technology infrastructures, platforms, software, and applications via the Internet.
Users can devote more time and effort to their main business processes instead of spending their time learning about the resources they need to manage.
Cloud computing allows users to avoid significant capital investments because they can rent physical infrastructure from third-party providers.
Cloud computing infrastructure services leverage shared resources, allowing servers to work efficiently withou
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This presentation is useful for who wants to know about the basics of cloud computing and the various approaches of cloudcomputing.It also explains the various advantages/disadvantages and also the risks of cloudcomputing.
Load Balancing In Cloud Computing:A ReviewIOSR Journals
Abstract: As the IT industry is growing day by day, the need of computing and storage is increasing
rapidly. The amount of data exchanged over the network is constantly increasing. Thus the process of this
increasing mass of data requires more computer equipment to meet the various needs of the organizations.
To better capitalize their investment, the over-equipped organizations open their infrastructures to others by
exploiting the Internet and other important technologies such as virtualization by creating a new computing
model: the cloud computing. Cloud computing is one of the significant milestones in recent times in the
history of computers. The basic concept of cloud computing is to provide a platform for sharing of resources
which includes software and infrastructure with the help of virtualization. This paper presents a brief review
of cloud computing. The main emphasize of this paper is on the load balancing technique in cloud
computing.
Keywords: Cloud Computing, Load Balancing, Dynamic Load Balancing, Virtualization, Data Center.
Challenges and Benefits-for Adopting the Paradigm of Cloud ComputingMervat Bamiah
Cloud computing is a rapidly emerging technology that has removed the saddle of buying licensed software and heavy hardware. By exploiting this technology, clients are able to access resources remotely by using a simple web browser. They are not required to maintain hardware devices or software applications, so it saves managing cost and time for organizations. Many industries, such as banking, healthcare, and education, are moving towards the cloud due to the efficiency of services provided by the pay-per-use pattern. The utilization and payment process of cloud computing is similar to other common utilities such as electricity. As the users of electricity are only required to pay for the amount of electricity consumed throughout the month. Similarly, cloud providers charge the users based on the exploitation of a cloud system or resources such as processing power used, transactions carried out, bandwidth consumed, data transferred, or storage space occupied. Cloud computing is a completely internet dependent technology where client data is stored in the data center of a cloud provider. There are various challenges for adopting cloud computing such as privacy, interoperability and reliability. Beside these challenges, there are also several benefits for adopting this technology such as cost savings, easy scalability, and increased productivity. This research paper introduces a big picture of cloud computing and analyzes the key challenges as well as benefits of adopting the paradigm of cloud computing.
Ant colony Optimization: A Solution of Load balancing in Cloud dannyijwest
As the cloud computing is a new style of computing over internet. It has many advantages along with some
crucial issues to be resolved in order to improve reliability of cloud environment. These issues are related
with the load management, fault tolerance and different security issues in cloud environment. In this paper
the main concern is load balancing in cloud computing. The load can be CPU load, memory capacity,
delay or network load. Load balancing is the process of distributing the load among various nodes of a
distributed system to improve both resource utilization and job response time while also avoiding a
situation where some of the nodes are heavily loaded while other nodes are idle or doing very little work.
Load balancing ensures that all the processor in the system or every node in the network does
approximately the equal amount of work at any instant of time. Many methods to resolve this problem has
been came into existence like Particle Swarm Optimization, hash method, genetic algorithms and several
scheduling based algorithms are there. In this paper we are proposing a method based on Ant Colony
optimization to resolve the problem of load balancing in cloud environment.
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...IIJSRJournal
Usually, cloud infrastructure is used individually by businesses, whereas the hybrid cloud would be a blend of two or many kinds of clouds. Because as clouds become increasingly common, safety issues also expanding. Because of such cybersecurity threats, numerous experts suggested procedures as well as ways to assure internet confidentiality. Providers of cloud-based services were accountable for the complete safety of cloud information. Nevertheless, since the clouds are accessible (easily accessible over the World wide web), much research has been conducted on cloud storage cybersecurity. This paper describes methods for enhancing security and reliability in decentralized cloud-based solutions, as well as suggests a few security solution methods of implementation.
Similar to A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING (20)
A CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATIONijasa
Social media platform has greatly enhanced human interactive activities in the virtual community. Virtual
socialization has positively influenced social bonding among social media users irrespective of one’s
location in the connected global village. Human user and social bot user are the two types of social media
users. While human users personally operate their social media accounts, social bot users are developed
software that manages a social media account for the human user called the botmaster. This botmaster in
most cases are hackers with bad intention of attacking social media users through various attacking mode
using social bots. The aim of this research work is to design an intelligent framework that will prevent
attacks through social bots on social media network platforms.
DESIGN OF A MINIATURE RECTANGULAR PATCH ANTENNA FOR KU BAND APPLICATIONSijasa
A significant portion of communication devices employs microstrip antennas because of their compact size,
low profile, and ability to conform to both planar and non-planar surfaces. To achieve this, we present a
miniature inset-fed rectangular patch antenna using partial ground plane for Ku band applications. The
proposed antenna design used an operating frequency of 15.5 GHz, a FR4 substrate with a dielectric
constant of 4.3, and a thickness of 1.4 mm. It is fed by a 50 Ω inset feedline. Computer simulation
technology (CST) software is used to design, simulate, and analyze. The simulation yields the antenna
performance parameters, including return loss (S11), bandwidth, VSWR, gain, directivity, and radiation
efficiency. The simulation findings revealed that the proposed antenna resonated at 15.5 GHz, with a
return loss of -22.312 dB, a bandwidth of 2.73 GHz (2730 MHz), VSWR of 1.17, a gain of 3.843 dBi, a
directivity of 5.926 dBi, and an antenna efficiency of -2.083 dB (61.901%).
SMART SOUND SYSTEM APPLIED FOR THE EXTENSIVE CARE OF PEOPLE WITH HEARING IMPA...ijasa
We, as normal people, have access to a potent communication tool, which is sound. Although we can continuously gather, analyse, and interpret sounds thanks to our sense of hearing, it can be challenging for people with hearing impairment to perceive their surroundings through sound. Also known as PWHI (People with Hearing Impairment). Auditory/phonic impairment is one of the most prevailing sensory deficits in humans at present. Fortunately, there is room to apply a solution to this issue, given the development of technology. Our project involves capturing ambient sounds from the user’s surroundings and notifying the user through a mobile application using IoT and Deep Learning. Its architecture offers sound recognition using a tool, such as a microphone, to capture sounds from the user's surroundings. These sounds are identified and categorized as ambient sounds, like a doorbell, baby cry, and dog barking; as well as emergency-related sounds, such as alarms, sirens, et
AN INTELLIGENT AND DATA-DRIVEN MOBILE VOLUNTEER EVENT MANAGEMENT PLATFORM USI...ijasa
In Lewis and Clark High School’s Key Club, meetings are always held in a crowded classroom. The
system of event sign-up is inefficient and hinders members from joining events. This has led to students
becoming discouraged from joining Key Club and often resulted in a lack of volunteers for important
events. The club needed a more efficient way of connecting volunteers with volunteering opportunities. To
solve this problem, we developed a VolunteerMatch Mobile application using Dart and Flutter framework
for Key Club to use. The next steps will be to add a volunteer event recommendation and matching feature,
utilizing the results from the research on machine learning models and algorithms in this paper.
A STUDY OF IOT BASED REAL-TIME SOLAR POWER REMOTE MONITORING SYSTEMijasa
We have Developed an IoT-based real-time solar power monitoring system in this paper. It seeks an opensource IoT solution that can collect real-time data and continuously monitor the power output and environmental conditions of a photovoltaic panel.The Objective of this work is to continuously monitor the status of various parameters associated with solar systems through sensors without visiting manually, saving time and ensures efficient power output from PV panels while monitoring for faulty solar panels, weather conditionsand other such issues that affect solar effectiveness.Manually, the user must use a multimeter to determine what value of measurement of the system is appropriate for appliance consumers, which is difficult for the larger System. But the Solar Energy Monitoring system is designed to make it easier for users to use the solar system.This system is comprised of a microcontroller (Node MCU), a PV panel, sensors (INA219 Current Module, Digital Temperature Sensor, LDR), a Battery Charger Module, and a battery. The data from the PV panels and other appliances are sent to the cloud (Thingspeak) via the internet using IoT technology and a Wi-Fi module (NodeMCU). It also allows users in remote areas to monitor the parameters of the solar power plant using connected devices. The user can view the current, previous, and average parameters of the solar PV system, such as voltage, current, temperature, and light intensity using a Graphical User Interface. This will facilitate fault detection and maintenance of the solar power plant easier and saves time.
SENSOR BASED SMART IRRIGATION SYSTEM WITH MONITORING AND CONTROLLING USING IN...ijasa
This paper presents the development of a sensor based smart irrigation system with the capabilities of remote monitoring and controlling of water usage in the agriculture field using Internet of Things (IoT). With the employment of IoT in irrigation system, all agricultural information can be viewed and controlled at the user's fingertips. The system consists of a microcontroller (Node MCU), sensors (soil moisture, DHT11), and irrigation of a water pump with a decision-making system. Sensors are linked to a Wi-Fi module (Node MCU) and are interdependent to provide increased sensitivity to the irrigation system. The data obtained will be uploaded to the cloud (ThingSpeak) and presented in the form of graphs accessible via the website. A web page is used to control the water pump for irrigation purposes. This paper is managed to meet all of its aims to help farmers in terms of time, project cost, labor, water consumption, power consumption, and reliability by implementing the IoT-based smart irrigation system.
COMPARISON OF BIT ERROR RATE PERFORMANCE OF VARIOUS DIGITAL MODULATION SCHEME...ijasa
Digital modulation increases information capacity, data security, and system availability while maintaining high communication quality. As a result, digital modulation techniques are in higher demand than analog modulation techniques due to their ability to transmit larger amounts of data. Amplitude Shift Keying (ASK), Frequency Shift Keying (FSK), Phase Shift Keying (PSK), Differential Phase Shift Keying (DPSK), and Quadrature Amplitude Modulation (QAM) are critical components of current communications systems development, particularly for broadband wireless communications. In this paper, the comparison of bit error rate performance of different modulation schemes (BPSK, QPSK, and16-QAM) and various equalization techniques such as constant modulus algorithm (CMA) and maximum likelihood sequence estimate (MLSE) for the AWGN and Rayleigh fading channels is analyzed using Simulink. BPSK outperforms QPSK and 16-QAM when compared to the other two digital modulation schemes. Among the three digital modulation schemes, BPSK is showing better performance as compared to QPSK and 16- QAM
PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...ijasa
Wireless communications are among the rapidly growing fields in our current life and have a massive effect on every aspect of our everyday life. In this paper, the performance of the various digital modulation techniques (BPSK, DPSK, QPSK, and QAM) based wireless communication system on the audio signal transmission through the additive Gaussian Noise (AWGN) channel is assessed on the basis of bit error rate (BER) as a function of the signal-to-noise ratio (SNR). Based on the results of this study, BPSK modulation outperforms the DPSK, QPSK, and QAM modulation strategies in the MIMO MC-CDMA VBlast based wireless communication system. The digital modulation of QPSK shows the worst performance in audio signal transmission especially in comparison to other digital modulations. It is clear from the current simulation study based on MATLAB that the V-Blast encoded 4×4 MIMO MC-CDMA wireless system with minimum mean square error (MMSE) signal detection and 1⁄2-rated convolution and cyclic redundancy check (CRC) channel encoding strategies show good performance utilizing BPSK digital modulation in audio signal transmission
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGijasa
Cloud computing is an anthology in which one or more computers are connected in a network. Cloud
computing is a cluster of lattice computing, autonomic computing and utility computing. Cloud provides an
on demand services to the users. Many numbers of users access the cloud to utilize the cloud resources.
The security is one the major problem in cloud computing. Hence security is a major issue in cloud
computing. Providing security is a major requirement of cloud computing. The study enclose all the
security issues and attack issues in cloud computing.
The International Journal of Ambient Systems and Applications (IJASA) ijasa
The International Journal of Ambient Systems and applications is a quarterly open access peer-reviewed journal that publishes articles which contribute new results in all areas of ambient Systems. The journal focuses on all technical and practical aspects of ambient Systems, networks, technologies and applications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced ambient Systems and establishing new collaborations in these areas.Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in ambient Systems.
TOWARD ORGANIC COMPUTING APPROACH FOR CYBERNETIC RESPONSIVE ENVIRONMENTijasa
The developpment of the Internet of Things (IoT) concept revives Responsive Environments (RE) technologies. Nowadays, the idea of a permanent connection between physical and digital world is technologically possible. The capillar Internet relates to the Internet extension into daily appliances such as they become actors of Internet like any hu-man. The parallel development of Machine-to-Machine
communications and Arti cial Intelligence (AI) technics start a new area of cybernetic. This paper presents an approach for Cybernetic Organism (Cyborg) for RE based on Organic Computing (OC). In such approach, each appli-ance is a part of an autonomic system in order to control a physical environment.The underlying idea is that such systems must have self-x properties in order to adapt their behavior to
external disturbances with a high-degree of autonomy.
A STUDY ON DEVELOPING A SMART ENVIRONMENT IN AGRICULTURAL IRRIGATION TECHNIQUEijasa
Maintaining a good irrigation system is a necessity in today’s water scarcity environment. This paper describes a new approach for automated Smart Irrigation (SIR) system in agricultural management. Using
various types of sensors in the crop field area, temperature and moisture value of the soil is monitored.Based on the sensed data, SIR will automatically decide about the necessary action for irrigation and also notifies the user. The system will also focus on the reduction of energy consumption by the sensors during communication.
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGYijasa
Denial of Service (DoS) or Distributed-Denial of Service (DDoS) is major threat to network security.
Network is collection of nodes that interconnect with each other for exchange the Information. This
information is required for that node is kept confidentially. Attacker in network computer captures this
information that is confidential and misuse the network. Hence security is one of the major issues. There
are one or many attacks in network. One of the major threats to internet service is DDoS (Distributed
denial of services) attack. DDoS attack is a malicious attempt to suspending or interrupting services to
target node. DDoS or DoS is an attempt to make network resource or the machine is unavailable to its
intended user. Many ideas are developed for avoiding the DDoS or DoS. DDoS happen in two ways
naturally or it may due to some botnets .Various schemes are developed defense against to this attack.
Main idea of this paper is present basis of DDoS attack. DDoS attack types, DDoS attack components,
survey on different mechanism to prevent DDoS
The smart mobile terminal operator platform Android is getting popular all over the world with its wide variety of applications and enormous use in numerous spheres of our daily life. Considering the fact of increasing demand of home security and automation, an Android based control system is presented in this paper where the proposed system can maintain the security of home main entrance and also the car door lock. Another important feature of the designed system is that it can control the overall appliances in a room. The mobile to security system or home automation system interface is established through Bluetooth. The hardware part is designed with the PIC microcontroller.
The World Wide Web is booming and radically vibrant due to the well established standards and widely accountable framework which guarantees the interoperability at various levels of the application and the society as a whole. So far, the web has been functioning at the random rate on the basis of the human intervention and some manual processing but the next generation web which the researchers called semantic web, edging for automatic processing and machine-level understanding. The well set notion, Semantic Web would be turn possible if only there exists the further levels of interoperability prevails among the applications and networks. In achieving this interoperability and greater functionality among the applications, the W3C standardization has already released the well defined standards such as RDF/RDF Schema and OWL. Using XML as a tool for semantic interoperability has not achieved anything effective and failed to bring the interconnection at the larger level. This leads to the further inclusion of inference layer at the top of the web architecture and its paves the way for proposing the common design for encoding the ontology representation languages in the data models such as RDF/RDFS. In this research article, we have given the clear implication of semantic web research roots and its ontological background process which may help to augment the sheer understanding of named entities in the web.
Wireless sensor networks provide ubiquitous computing systems in various open environments. In the
environment, sensor nodes can easily be compromised by adversaries to generate injecting false data
attacks. The injecting false data attack not only consumes unnecessary energy in en-route nodes, but also
causes false alarms at the base station. To detect this type of attack, a bandwidth-efficient cooperative
authentication (BECAN) scheme was proposed to achieve high filtering probability and high reliability
based on random graph characteristics and cooperative bit-compressed authentication techniques. This
scheme may waste energy resources in en-route nodes due to the fixed number of forwarding reports. In
this paper, our proposed method effectively selects a dynamic number of forwarding reports in the source
nodes based on an evaluation function. The experimental results indicate that our proposed method
enhances the energy savings while maintaining security levels as compared to BECAN.
Artificial neural networks (ANN) consider classification as one of the most dynamic research and
application areas. ANN is the branch of Artificial Intelligence (AI). The neural network was trained by
back propagation algorithm. The different combinations of functions and its effect while using ANN as a
classifier is studied and the correctness of these functions are analyzed for various kinds of datasets. The
back propagation neural network (BPNN) can be used as a highly successful tool for dataset classification
with suitable combination of training, learning and transfer functions. When the maximum likelihood
method was compared with backpropagation neural network method, the BPNN was more accurate than
maximum likelihood method. A high predictive ability with stable and well functioning BPNN is possible.
Multilayer feed-forward neural network algorithm is also used for classification. However BPNN proves to
be more effective than other classification algorithms.
Wireless sensor networks (WSNs) are regularly deployed in harsh and unattended environments, and
sensor nodes are easily exposed to attacks due to the random arrangement of the sensor field. An attacker
can inject fabricated reports from a compromised node with false votes and false vote-based reports. The
false report attacks can waste the energy of the intermediate nodes, shortening the network lifetime.
Furthermore, false votes cause the filtering out of legitimate reports. A probabilistic voting-based filtering
scheme (PVFS) was proposed as a countermeasure against this type of attacks by Li and Wu. PVFS uses a
vote threshold, a security threshold, and a verification node. The scheme does not make additional use
energy or communications resources because the verification node and threshold values are fixed. There
needs to be a verification node selection method that considers the energy resources of the node. In this
paper, we propose a verification path election scheme based on a fuzzy logic system. In the proposed
scheme, one node transmits reports in the node with a strong state through a fuzzy logic system after which
a neighbor is selected out of two from the surroundings. Experimental results show that the proposed
scheme improves energy savings up to maximum 13% relative to the PVFS.
In this paper a novel intelligent soft computing based cryptographic technique based on synchronization of
two chaotic systems (CSCT) between sender and receiver has been proposed to generate session key using
Pecora and Caroll (PC) method. Chaotic system has some unique features like sensitive to initial
conditions, topologically mixing; and dense periodic orbits. By nature, the Lorenz system is very sensitive
to initial conditions meaning that the error between attacker and receiver is going to grow exponentially if
there is a very slight difference between their initial conditions. All these features make chaotic system as
good alternatives for session key generation. In the proposed CSCT few parameters ( , b , r , x1 ,y2 and z2 )
are being exchanged between sender and receiver. Some of the parameter which takes major roles to form
the session key does not get transmitted via public channel, sender keeps these parameters secret. This way
of handling parameter passing mechanism prevents any kind of attacks during exchange of parameters like
sniffing, spoofing or phishing.
A black-hole attack in the Mobile Ad-hoc NETwork (MANET) is an attack occurs due to malicious nodes,
which attracts the data packets by falsely advertising a fresh route to the destination. In this paper, we
present a clustering approach in Ad-hoc On-demand Distance Vector (AODV) routing protocol for the
detection and prevention of black-hole attack in MANETs. In this approach every member of the cluster will
ping once to the cluster head, to detect the peculiar difference between the number of data packets received
and forwarded by the node. If anomalousness is perceived, all the nodes will obscure the malicious nodes
from the network.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
1. International Journal of Ambient Systems and Applications (IJASA) Vol.4, No.1, March 2016
DOI:10.5121/ijasa.2016.4101 1
A SCRUTINY TO ATTACK ISSUES AND SECURITY
CHALLENGES IN CLOUD COMPUTING
Subramaniam.T.K1*,
Deepa.B2
*1
M.E.Scholar, Department of Computer Science & Engineering Nandha
Engineering College, Erode, Tamil Nadu, India
2
Assistant Professor, Department of Computer Science & Engineering, Nandha
Engineering College, Erode, Tamil Nadu, India
ABSTRACT
Cloud computing is an anthology in which one or more computers are connected in a network. Cloud
computing is a cluster of lattice computing, autonomic computing and utility computing. Cloud provides an
on demand services to the users. Many numbers of users access the cloud to utilize the cloud resources.
The security is one the major problem in cloud computing. Hence security is a major issue in cloud
computing. Providing security is a major requirement of cloud computing. The study enclose all the
security issues and attack issues in cloud computing.
KEYWORDS
Grid computing, autonomic computing
1. INTRODUCTION
Cloud computing other wise said to be an on-demand computing. Cloud computing is one of the
types of Internet-based computing in which sharing of cloud resources, data and information.
Normally data and programs are run on individual desktop computers. Instead these are run on
cloud environments. Cloud computing provides platform, communications services and end user
application services. The Cloud computing plays a vital role in IT industry [1]. The network of
networks gives a remote access to set of resources that would be a decentralized. Cloud
computing is flexible, multi-tendency and scalable. In this study the section 2 provides a
deployment model of cloud computing, section 3 provides security challenges in cloud computing
and attack issues.
2. CLOUD SERVICE MODEL
Cloud computing connect delivering computing resources such as remote servers machines, data
storages space, and cloud users applications are services to end users by cloud computing service
supplier. End users access on-demand cloud services via web browsers. Cloud computing service
providers propose specific cloud services and make sure the significance of the services.
Essentially, cloud computing consist of three layers: the system layer, the middle layer or
platform layer, and the top layer or application layer.
2. International Journal of Ambient Systems and Applications (IJASA) Vol.4, No.1, March 2016
The bottom layer
The bottom layer is the system layer, which
communications of servers, network devices,
a-service (IaaS). The computational resources are
services [2]. With the exploit of virtualization technology, IaaS
allow clients to build composite
importing physical apparatus for
administration since IT professionals are not
network resources. The example
EC2. It offers a virtual computing environme
boundary, users can deploy Solaris or Windows based virtual machines
own tradition applications.
Fig: cloud service Deployment Model
The middle layer
The middle layer is the platform layer and is said to be a
planned to supply a development platform for users to design their explicit
layer services offers by this cloud model contain tools and libraries for applicatio
permit users to have organized over the application deployment a
Platform-as-a-Service model, programmers
tools, therefore dropping the cost
Service model it is a suite of Go
Google Docs, Google Calendar,
own domain names [1][2]. Windows
users to construct own applications using various languages
Users can then incorporate the applications into their
The top layer
The top layer is the application layer, also called
permits users to lease applications runs
applications. Because of its ability to
middle of companies that install
a-Service. With the use of the online
thousands of daily customer tickets more efficiently
International Journal of Ambient Systems and Applications (IJASA) Vol.4, No.1, March 2016
The bottom layer is the system layer, which comprise of additional resources such as
ers, network devices, and memory storage. It is said to be Infrastructures
(IaaS). The computational resources are prepared and accessible for users as on
of virtualization technology, IaaS also offer virtual machines that
network infrastructures. This model not only diminish
for commerce, it also reduces the weight load of computer
IT professionals are not essential to frequently monitor the health of physical
examples of a cloud computing service supplier of IaaS are
a virtual computing environment with web service interfaces. By
eploy Solaris or Windows based virtual machines, Linux, and
Fig: cloud service Deployment Model
the platform layer and is said to be a Platform-as-a-Service (PaaS). It is
planned to supply a development platform for users to design their explicit applications.
by this cloud model contain tools and libraries for application enlargement
over the application deployment and configuration settings. With
model, programmers are not necessary to obtain software development
cost of buying tools. Google Apps is an example of Platform
it is a suite of Google tools that comprises Google Talk, Gmail, Google Groups,
Google Calendar, and Google Sites. It permits users to modify these tools on their
. Windows Azure is another Platform-as-a-Service provider.
applications using various languages and domains, tools or frameworks.
the applications into their presented IT environments.
he application layer, also called as Software-as-a-Service (SaaS). This
applications runs clouds as a substitute of paying to purchase these
applications. Because of its ability to decrease costs. Software-as-a-Service is popular
install their businesses. Group on is an example that uses
. With the use of the online bearer solutions provided by Zendesk, Groupon
tickets more efficiently.
International Journal of Ambient Systems and Applications (IJASA) Vol.4, No.1, March 2016
2
al resources such as
Infrastructures-
for users as on-demand
machines that
diminish the cost in
computer network
monitor the health of physical
of a cloud computing service supplier of IaaS are Amazon’s
By using the
Linux, and execute their
Service (PaaS). It is
applications. Middle
n enlargement,
nd configuration settings. With
are not necessary to obtain software development
Platform- as-a-
Google Groups,
these tools on their
Service provider. It enables
tools or frameworks.
Service (SaaS). This layer
of paying to purchase these
is popular in the
on is an example that uses Software-as-
Groupon processes its
3. International Journal of Ambient Systems and Applications (IJASA) Vol.4, No.1, March 2016
3
2.1. BENEFITS OF CLOUD COMPUTING
Reduced IT costs
Moving to cloud computing may diminish the cost of running and preserve IT systems. Rather
than acquire costly systems and equipment for your business, cloud computing can decrease the
costs by using the resources of cloud computing service supplier. It may be able to diminish the
working costs because: the cost of system upgrades, original hardware and software may be built-
in in the agreement; cloud computing no longer need to pay wages for expert staff, the energy
utilization costs may be condensed, there are fewer time delays.
Scalability
The business can scale up or scale down the procedure and storage desires quickly to suit
situation, permit flexibility as needs change. Rather than purchase and install expensive upgrade
in individual computer, cloud computer service provider can handle this all works. Use the cloud
frees up the moment so we can get on with managing business.
Business continuity
Defending data and systems is an imperative part of business durability development. Whether
experience a natural tragedy, power collapse or other predicament, encloses the data accumulate
in the cloud environments ensure that it is backed up and confined in a secure and safe position.
Being able to right to use data again rapidly permit conducting business as usual, minimizing any
downtime and overcome of productivity.
Collaboration effectiveness
Collaboration in a cloud computing environment gives the business capacity to commune and
share more easily external of the traditional communication methods. If cloud computing
operating on a project across different locations, might use cloud computing to provide
employees, contractors and third parties admission to the equal files. The cloud users choose a
cloud computing representation that formulates it easy for to share your report with adviser.
Flexibility of work practices
Cloud computing allow employees to be more stretchy in their work practices. For example, they
have the ability to access data from home, on holiday, or via the convert to and from work. If
need admission to data while off-site, can connect to useful office, quickly and easily.
Cost Savings
Perhaps, the most important cloud computing advantages is in terms of IT expenditure funds.
Businesses, no issue with their type or size, exist to make money while keeping investment and
operational expenses to a minimum. With cloud computing, you can save important capital costs
with zero in-house server storage space and application requirements. The need of on-premises
infrastructure also removes their related operational costs in the forms of bandwidth and power
supply, air provision for server rooms and management costs.
4. International Journal of Ambient Systems and Applications (IJASA) Vol.4, No.1, March 2016
Manageability
Cloud computing provides enhanced and basic IT management and maintenance capabilities
through central management of resources, vendor managed infrastructure and S
agreements. IT communications
computing resources are maintained by
for access software, applications and services need not to installation
Agreement ensures the timely and assured delivery,
3. SECURITY CHALLENGES
3.1. Security Issues in Software as a Service
Software-as-a-Service offers application services on demand such as electronic mail, audio and
video conferencing software tools, and business specific applications such as ERP, CRM, and
SCM. Software-as-a-Service users have fewer controls over security among the three
fundamental delivery representations in the
applications may raise some security concerns.
•VIRTUALIZATIO
•VIRTUAL
MACHINE
MONITOR
•APPLICATION
SECURITY
•DATA SECURITY
SOFTWARE AS A
INFRASTURCURE
International Journal of Ambient Systems and Applications (IJASA) Vol.4, No.1, March 2016
Cloud computing provides enhanced and basic IT management and maintenance capabilities
through central management of resources, vendor managed infrastructure and S
communications updates and continuance are eliminating, as all
resources are maintained by the service provider. A simple web-based user interface
re, applications and services need not to installation and a S
ensures the timely and assured delivery, management and maintenance of
HALLENGES
Fig: Security Challenges in cloud
3.1. Security Issues in Software as a Service
application services on demand such as electronic mail, audio and
video conferencing software tools, and business specific applications such as ERP, CRM, and
users have fewer controls over security among the three
livery representations in the cloud [3]. The adoption of Software
applications may raise some security concerns.
•DDoS ATTACKS
•MALWAARE
INJECTION
ATTACKS
•UNDERLAYING
INFRSTRUCURE
•THIRD PARTY
RELATIONSHP
SOFTWARE AS A
SERVICE
PLATFORM AS A
SERVICE
ATTACKS IN WEB
SERVICE
INFRASTURCURE
AS A SERVICE
International Journal of Ambient Systems and Applications (IJASA) Vol.4, No.1, March 2016
4
Cloud computing provides enhanced and basic IT management and maintenance capabilities
through central management of resources, vendor managed infrastructure and Service Level
are eliminating, as all the cloud
based user interface
Service Level
of IT services.
application services on demand such as electronic mail, audio and
video conferencing software tools, and business specific applications such as ERP, CRM, and
users have fewer controls over security among the three
Software-as-a-Service
DDoS ATTACKS
MALWAARE
UNDERLAYING
INFRSTRUCURE
THIRD PARTY
RELATIONSHP
5. International Journal of Ambient Systems and Applications (IJASA) Vol.4, No.1, March 2016
5
3.1.1.1. Application Security
These application requests are usually transport to the user via the Internet through a Web
browser. However, blemish in web applications may generate vulnerabilities for the Software-as-
a-Service applications [4][5]. The botnets in the network may create malicious activities Security
challenges in Software-as-a-Service applications are same as that of web application technology,
but conventional security solutions does not successfully protect it from malicious attacks[8]. The
Open Web Application Security Project (OWASP) has recognized the ten most critical web
applications security threats.
3.1.1.2 Multi-Tendency
Multi-tenancy is a structural design in which a distinct instance of a software application provides
numerous customers. Each customer is said to be a tenant. Tenants may be given the capability to
modify some parts of the application, such as colour of the graphical user interface or it may with
business rules, but they not able to customize the application's code [10]. Software-as-a-Service
applications can be clustered into development models that are resolute by the following
characteristics: with metadata it is configurable and also it is configurable.
In the architectural model, each and every client has individual customized instance of the
software application. This architectural model has disadvantages, but security issues are less
when compared to other models. In the next maturity model, the dealer also supplies different
instances of the applications for each and every customer, but all the instances use the same
application code. In this maturity model the customers can customize some configuration options
to satisfy their needs. In the last maturity model multi-tenancy is appended, so that single
instances that serves all customers [9]. This approach facilitates more efficient use of the
resources but scalability is restrictive. Since the data sources from multiple tenants are likely to be
stored in the same database. Security mechanism policies are required to guarantee that
customer’s data are kept take apart away from other customers.
3.1.3 Accessibility
Accessing applications over the internet are shared via users through web browser. This allow
user to makes access from any network connected devices easier. It also includes public
computers devices, remote and mobile devices. It also exposes the service to extra security risks.
The Cloud Security Alliance [10] has discharged a document. The document that explains the
present state of mobile computing and the threats in this area such as information pinching mobile
malware devices, insecure wireless networks, vulnerabilities originate in the device Operating
System and official business applications, and proximity-based hew.
3.2. Platform-as-a-service security Issues
Platform-as-a-service provides facilitates for deployment of cloud-based applications without the
charge of importing and maintaining the underlying hardware platforms and software layers [11].
As with Software as a Service and Infrastructure as a Service, Platform as a Service depends on a
protected and trustworthy network and secure web browser applications. Platform as a Service
application security covers two software layers. That includes Security of the platform itself that
is runtime and engine. Security of customer applications implemented on this platform [10]. This
is responsible for protected the platform software stack from attacks and other security issues.
6. International Journal of Ambient Systems and Applications (IJASA) Vol.4, No.1, March 2016
6
3.2.1. Third-party relationships
Platform as a Service provides a traditional program Languages, software platforms to end user.
This also provides a third-party web services components such as mashups [11]. Mashups
application combine more than one source element into a single incorporated unit. This also has
security related to issues. In this platform user has to depend on security of web hosted tools and
also depends on third party security issues.
3.2.2. Infrastructure security
In Platform-as-a-service, programmers and developers do not access to the underlying
infrastructure layers, so clod service providers are only responsible for securing their underlying
infrastructure layers as well as the end user applications services [12]. Even though developers
and programmers are in control of the securing their applications, they do not have the guarantee
that the maturity environment tools provided by a Platform-as-a-service provider are secure.
3.3. Infrastructure as a service security Issues
Infrastructure as a Service provides a number of resources such as web servers, data storage
space, networks, and other resources necessary for computing .These of connected in the form of
virtualized systems. These virtualized system are accessed through internet [13] .The user of
system can run any software and application with control over with allocated virtual resources.
They need to control the running software and configure the security policies.
3.3.1. Virtualization
Virtualization allows users to run a variety of applications and also it allow user create and share
virtual machines. These virtual machines are more vulnerable to the environment. The attackers
can attack the target system easily with help of new virtual machines .The new virtual machines
can easily deployed in cloud environments. This is complex to provide a security to physical
machine rather than virtual machines. This system will be more vulnerable to all types of security
attacks. Providing security to virtual machines is a challenge task.
3.1.2 Virtual machine monitor
The Virtual Machine Monitor (VMM) or hypervisor is answerable for virtual machines
separation. Therefore, if the Virtual Machine Monitor is compromised, its virtual machines may
potentially be compromised as well. The Virtual Machine Monitor is low-level software
application. That software application manages and monitors all the virtual machines in cloud
environment. To make it secure keep the virtual machines as simple and use small virtual
machine software application [14]. This virtualization can reduce fault tolerance and maintains a
load balancing. This virtualization also acts as a loop hole for attackers. The malicious virtual
machine can attack other virtual machines. This is also a challenging task to provide security to
virtual machines.
7. International Journal of Ambient Systems and Applications (IJASA) Vol.4, No.1, March 2016
3.4. WEB SERVICE ATTACKS IN CLOUD
3.4.1 DDoS Attacks
DDoS attack is said to be a Distributed Denial of Service attack. In
tries to avoid the valid users to access the resources
attack, the attacker send huge number of
verifies each and every message packets.
returned invalid addresses.
While verifying requests packets
to halt before finale the connection [
server, the attacker sends more valid
makes the network and to be server in a busy state
traffic and services are not available
Fig : web service
3.4.2. Malware Injection Attacks
In the cloud computing environment the client’s request is processed
authorization, at that time there is a huge opportunity
server and web browser. An attacker can take advantage during
During this time the attacker attempts
environment. This injected service or code which looks like a service that are already available in
the cloud environments. Once the malicious code is injected in cloud, it will run continuously as a
single instance. And it affects the cloud
attackers in cloud environments. It is one of the major security challenges in cloud.
DDoS
Attacks
International Journal of Ambient Systems and Applications (IJASA) Vol.4, No.1, March 2016
ATTACKS IN CLOUD
DDoS attack is said to be a Distributed Denial of Service attack. In DDoS attack, the attacker
to access the resources and services in the cloud environment
the attacker send huge number of messages packets to the target server .The target server
verifies each and every message packets. While verifying the requests message packets
packets, the server become over loaded. The attackers make the server
before finale the connection [17] [18]. When the request association is blocked by t
cker sends more valid messages packets with invalid network addr
server in a busy state and overloaded. This attack causes the network
traffic and services are not available to the end users.
Fig : web service attacks in cloud
3.4.2. Malware Injection Attacks
In the cloud computing environment the client’s request is processed based on authentication and
at that time there is a huge opportunity of Meta data switch over between the web
web browser. An attacker can take advantage during this switch over time
attacker attempts to introduce a harmful code or any other service
environment. This injected service or code which looks like a service that are already available in
Once the malicious code is injected in cloud, it will run continuously as a
instance. And it affects the cloud environments [15]. This will create a loop hole for
attackers in cloud environments. It is one of the major security challenges in cloud.
Malware
Injection
Attacks
Phising
Attacks
DDoS
Attacks
International Journal of Ambient Systems and Applications (IJASA) Vol.4, No.1, March 2016
7
DoS attack, the attacker
environment. In this
packets to the target server .The target server
message packets, it has
attackers make the server
blocked by the
addresses. This
This attack causes the network
based on authentication and
switch over between the web
time of metadata.
service to cloud
environment. This injected service or code which looks like a service that are already available in
Once the malicious code is injected in cloud, it will run continuously as a
. This will create a loop hole for
8. International Journal of Ambient Systems and Applications (IJASA) Vol.4, No.1, March 2016
8
3.4.3. Wrapping attacks
Wrapping attacks use XML signature wrapping to increase a weakness when web servers validate
the signed requests [15]. The attack is done at the time of the translation of SOAP messages
between a valid user and the web server. By replica the user’s account and password in the login
period, the hacker inserts a bogus element into the communication structure, shift the original
message body under the wrapper that replaces the content of the message content with harmful
code, and then sends the message packets to the server. Hence the original body is still valid; the
server will be scam into approve the message that has actually been altered. As a result, the
hacker is able to gain unauthorized admittance to secured resources and succession the proposed
operations.
3.4.4. Phishing attack
Phishing is a way of rescue personal information from innocent user through sending emails,
webpage linker and instant message. These links appear to the genuine but leads to false access
locations. Phishing attacks are of two categories one is abuse behavior: an attacker multitudes a
phishing attack site in the cloud computing environments by using cloud services [16]. Second
one is hijack the accounts using social or public engineering technique. To avoid the phishing
attacks admission to sensitive data about the enterprise. The client or employee passwords used to
admittance the cloud should be strong password and hard enough to guess. This also one of the
security challenges to cloud environment.
3.4.4. Stepping stone attack
Stepping stone attack the impostor attempt to access the data. The attacker hides their locations
and their identity. This is not done by directly intruding in to target fatalities host by with help of
series of other hosts called stepping Stone [16]. Stepping stone host is identified based on
investigation of inward and leaving traffic through stepping stone host. This increase the network
traffic and delay in network .This type of attack is more vulnerable to cloud environments.
4. CONCLUSION
Cloud Computing is a comparatively new technology that provides a good more numbers of
benefits for its users. Cloud computing also economically profitable to the business people and IT
industry .Simultaneously cloud computing also lift up some protection problems which may
cause and down its use .Accepting and understanding the vulnerabilities, loop hole exist in Cloud
Computing environment will help organizations and business, IT industry to make secure towards
the Cloud environments. This survey discuss about security issues in cloud computing primarily
concentrate on the security issues and vulnerabilities in the environments.
9. International Journal of Ambient Systems and Applications (IJASA) Vol.4, No.1, March 2016
9
5. REFERENCES
[1] Zhao G, Liu J, Tang Y, Sun W, Zhang F, Ye X, Tang N “ Cloud Computing: A Statistics
Aspect of Users. In: First International Conference on Cloud Computing (CloudCom),”
Beijing, China. Springer Berlin, Heidelberg, pp 347–358,2009.
[2 ]Zhang S, Zhang S, Chen X, Huo X “Cloud Computing Research and Development Trend. In:
Second International Conference on Future Networks (ICFN’10), Sanya, Hainan, China”
IEEE Computer Society, Washington, DC, USA, pp 93–97, 2010.
[3] Cloud Security Alliance “Security guidance for critical areas of focus in Cloud Computing
V3.0.. Available: https://cloudsecurityalliance.org/ guidance/csaguide.v3.0.pdf, 2011.
[4 ]Marinos A, Briscoe G “Community Cloud Computing. In: 1st International Conference on
Cloud Computing (CloudCom), Beijing, China. Springer-Verlag Berlin, Heidelberg”2009.
[5] Khalid A ,” Cloud Computing: applying issues in Small Business. In: International
Conference on Signal Acquisition and Processing (ICSAP’10),pp 27,2010.
[6] Mather T, Kumaraswamy S, Latif S ,” Cloud Security and Privacy”. O’Reilly Media, Inc.,
Sebastopol, CA,2009.
[7] Li W, Ping L “ Trust model to enhance Security and interoperability of Cloud environment.
In: Proceedings of the 1st International conference on Cloud Computing”,. Springer Berlin
Heidelberg, Beijing, China, pp 69–79,2009.
[8] Rittinghouse JW, Ransome JF,”Security in the Cloud. In: Cloud Computing. Implementation,
Management, and Security, CRC Press,2009
[9] Grobauer B, Walloschek T, Stocker E ,”Understanding Cloud Computing vulnerabilities.”
IEEE Security Privacy 9(2):50–57,2011.
[10] Subashini S, Kavitha V ,”A survey on Security issues in service delivery models of Cloud
Computing. J Netw Comput Appl 34(1):1,2011.
[11] Onwubiko C,” Security issues to Cloud Computing. In: Antonopoulos N, Gillam L (ed) Cloud
Computing: principles, systems & applications. Springer-Verlag,2010.
[12] Morsy MA, Grundy J, Müller I ,” An analysis of the Cloud Computing Security problem. In:
Proceedings of APSEC 2010 Cloud Workshop. APSEC, Sydney, Australia”,2010.
[13] Jansen WA ,” Cloud Hooks: Security and Privacy Issues in Cloud Computing. In:
Proceedings of the 44th Hawaii International Conference on System Sciences, Koloa”, Kauai,
HI. IEEE Computer Society, Washington, DC,USA, pp 1–10,2011.
[14] Zissis D, Lekkas D ,”Addressing Cloud Computing Security issues. Future Generations
Computer System “,28(3):583–592,2012.
[15] Kazi Zunnurhain and Susan V. Vrbsky, “Security Attacks and Solutions in Clouds”2013.
[16] Apurva Shitoot, Sanjay Sahu, Rahul Chawda, “Security Aspects in Cloud Computing”,
IJETT, Volume 6 number 3 - Dec 2013
[17] Subramaniam.T.K, Deepa.B , “A Review towards DDoS Prevention and Detection
Methodology” International Journal of Computational Science and Information Technology
(IJCSITY) Vol.3,No.1/2/3,August 2015.
[18] Subramaniam.T.K, Deepa.B, “A Survey On DDOS Attack Detection And Prevention
Methodology” International Journal of Intellectual Advancements and Research in
Engineering Computations, JUNE 2015
10. International Journal of Ambient Systems and Applications (IJASA) Vol.4, No.1, March 2016
10
AUTHORS
T.K.SUBRAMANIAM received the B.Tech degree in Information technology
from Nandha Engineering College in the year 2014.He is currently doing h
is M.E Computer science and Engineering in Nandha engineering college, Erode,
India. His area of interest is web services. He has published many journal papers.
B.DEEPA received the M.E degree in Computer Science and Engineering from
Nandha Engineering College in the year 2011.She is currently working as
Assistant Professor in Nandha Engineering College, Erode, India. She has
published many international and natioanal research papers. Her area is Network
security and web services. She has depth knowledge of her research area.