IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Josep Blanquer, Sr. Systems Architect at RightScale, led this session at the RightScale User Conference 2010 in Santa Clara.
Session Abstract: Deploying in multi-cloud environments involves much more than just choosing which cloud provider to use. It requires seamlessly deploying parts of a company's infrastructure across multiple clouds that function in concert while spanning infrastructure providers. In this session, you'll learn about the abstractions necessary to deliver portability and ease of management in a multi-cloud environment. Some important concepts to address include image management, template management, mixed deployments and data portability. We'll present examples of multi-cloud scenarios and describe the design principles to consider when architecting deployments that must span and migrate across different clouds and providers.
Collaboration in multicloud computing environments framework and security issuesIEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
RightScale Webinar: December 8, 2010 – In this Webinar, we discuss the benefits and pain points of multi-cloud as well as key considerations to have in mind when going multi-cloud. We present examples of multi-cloud scenarios and describe the design principles to consider when architecting deployments that must span and migrate across different clouds and providers.
Josep Blanquer, Sr. Systems Architect at RightScale, led this session at the RightScale User Conference 2010 in Santa Clara.
Session Abstract: Deploying in multi-cloud environments involves much more than just choosing which cloud provider to use. It requires seamlessly deploying parts of a company's infrastructure across multiple clouds that function in concert while spanning infrastructure providers. In this session, you'll learn about the abstractions necessary to deliver portability and ease of management in a multi-cloud environment. Some important concepts to address include image management, template management, mixed deployments and data portability. We'll present examples of multi-cloud scenarios and describe the design principles to consider when architecting deployments that must span and migrate across different clouds and providers.
Collaboration in multicloud computing environments framework and security issuesIEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
RightScale Webinar: December 8, 2010 – In this Webinar, we discuss the benefits and pain points of multi-cloud as well as key considerations to have in mind when going multi-cloud. We present examples of multi-cloud scenarios and describe the design principles to consider when architecting deployments that must span and migrate across different clouds and providers.
IT Geek Week 2016 - Introduction To Cloud ComputingHaim Ateya
An introduction to cloud computing which provides users information about different cloud models, types, how it all fit in in today's world and lay out the ecosystem. in addition, I provide some additional information on cloud technologies like storage, network and compute.
Cloud computing has won and most companies are using more than one public and private clouds. This has created challenges and complexity which are addressed by new technology such as Istio service mesh.
The presentation describes reasons for selecting multi-cloud operation approach and provides an overview of implementation challenges and how they can be addressed
soCloud: distributed multi-cloud platform for deploying, executing and managi...Fawaz Fernand PARAISO
Multi-cloud computing has established itself as a paradigm of choice for creating very large scale world wide distributed applications. Multi-cloud computing is the usage of multiple, independent cloud environments, which assumed no priori agreement between cloud providers or third party. However, these applications, designed for multi-cloud environments, have to face real challenges in term of design, architecture, and technology. The possibility of using multi-cloud faces the heterogeneity and complexity of cloud solutions. Thus, multi-cloud computing has to face several challenges such as portability, provisioning, elasticity, and high availability we have identified in this thesis.
In this thesis, we propose soCloud both a model and a platform that tackle these four challenges. This model is based on the OASIS Service Component Architecture (SCA) standard to design distributed large scale applications for multi-cloud environments. A new language is proposed to effectively express the elasticity of multi-cloud applications through abstraction. The multi-cloud platform is designed to deploy and manage distributed applications across multi-clouds.
The soCloud model is illustrated on three distributed applications deployed in multi- cloud environments. The soCloud platform has been implemented, deployed and experimented on top of ten existing cloud providers : Windows Azure, DELL KACE, Amazon EC2, CloudBees, OpenShift, dotCloud, Jelastic, Heroku, Appfog, and an Eucalyptus private cloud. These experiments are used to validate the novelty of the contributed solutions.
With our contributions, we aim to provide a simple and effective way to design, deploy, run, and manage distributed applications for a multi-cloud environment by proposing a model and platform.
What is Cloud Hosting? Here is Everything You Must Know About ItReal Estate
Cloud server hosting is one of the more popular kinds of web hosting today. It is a type of web hosting where features of several servers are used together. https://bit.ly/3jPmaVx
Cloud computing and Cloud Security - Basics and TerminologiesTechsparks
Cloud Computing is a new trending field these days and is an Internet-based service. It is based on the concept of virtualization.
http://www.techsparks.co.in
A comprehensive review of OpenStack then and now, each project's architecture, and hard data on why the race for open cloud is over. (First edition delivered April 2013 at OpenStack Summit. This version is from SPDEcon on June 10, 2013.)
Cloud Service Life-Cycle
Cloud Deployment Scenarios
Cloud Service Development and Testing
Web Service Slicing for Regression Testing of Services
Cloud Service Evolution Analytics
Quality of Service and Service Level Agreement
Introduction to Cloud computing and Microsoft azureShravandeepYadav
Basic introduction to Cloud Computing and microsoft azure. Journey of Cloud computing. Journey of azure certification.Microsoft azure Services. Azure Subsricptions.
Third year diploma in Information technology
Security for Effective Data Storage in Multi CloudsEditor IJCATR
Cloud Computing is a technology that uses the internet and central remote servers to maintain data and
applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal
files at any computer with internet access. This technology allows for much more efficient computing by centralizing data
storage, processing and bandwidth. The use of cloud computing has increased rapidly in many organizations. Cloud computing
provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor
in the cloud computing environment, as users often store sensitive information with cloud storage providers but these providers
may be untrusted. Dealing with “single cloud” providers is predicted to become less popular with customers due to risks of
service availability failure and the possibility of malicious insiders in the single cloud. A movement towards “multi-clouds”, or in
other words, “interclouds” or “cloud-of clouds” has emerged recently. This paper surveys recent research related to single and
multi-cloud security and addresses possible solutions. It is found that the research into the use of multicloud providers to maintain
security has received less attention from the research community than has the use of single clouds. This work aims to promote the
use of multi-clouds due to its ability to reduce security risks that affect the cloud computing user.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IT Geek Week 2016 - Introduction To Cloud ComputingHaim Ateya
An introduction to cloud computing which provides users information about different cloud models, types, how it all fit in in today's world and lay out the ecosystem. in addition, I provide some additional information on cloud technologies like storage, network and compute.
Cloud computing has won and most companies are using more than one public and private clouds. This has created challenges and complexity which are addressed by new technology such as Istio service mesh.
The presentation describes reasons for selecting multi-cloud operation approach and provides an overview of implementation challenges and how they can be addressed
soCloud: distributed multi-cloud platform for deploying, executing and managi...Fawaz Fernand PARAISO
Multi-cloud computing has established itself as a paradigm of choice for creating very large scale world wide distributed applications. Multi-cloud computing is the usage of multiple, independent cloud environments, which assumed no priori agreement between cloud providers or third party. However, these applications, designed for multi-cloud environments, have to face real challenges in term of design, architecture, and technology. The possibility of using multi-cloud faces the heterogeneity and complexity of cloud solutions. Thus, multi-cloud computing has to face several challenges such as portability, provisioning, elasticity, and high availability we have identified in this thesis.
In this thesis, we propose soCloud both a model and a platform that tackle these four challenges. This model is based on the OASIS Service Component Architecture (SCA) standard to design distributed large scale applications for multi-cloud environments. A new language is proposed to effectively express the elasticity of multi-cloud applications through abstraction. The multi-cloud platform is designed to deploy and manage distributed applications across multi-clouds.
The soCloud model is illustrated on three distributed applications deployed in multi- cloud environments. The soCloud platform has been implemented, deployed and experimented on top of ten existing cloud providers : Windows Azure, DELL KACE, Amazon EC2, CloudBees, OpenShift, dotCloud, Jelastic, Heroku, Appfog, and an Eucalyptus private cloud. These experiments are used to validate the novelty of the contributed solutions.
With our contributions, we aim to provide a simple and effective way to design, deploy, run, and manage distributed applications for a multi-cloud environment by proposing a model and platform.
What is Cloud Hosting? Here is Everything You Must Know About ItReal Estate
Cloud server hosting is one of the more popular kinds of web hosting today. It is a type of web hosting where features of several servers are used together. https://bit.ly/3jPmaVx
Cloud computing and Cloud Security - Basics and TerminologiesTechsparks
Cloud Computing is a new trending field these days and is an Internet-based service. It is based on the concept of virtualization.
http://www.techsparks.co.in
A comprehensive review of OpenStack then and now, each project's architecture, and hard data on why the race for open cloud is over. (First edition delivered April 2013 at OpenStack Summit. This version is from SPDEcon on June 10, 2013.)
Cloud Service Life-Cycle
Cloud Deployment Scenarios
Cloud Service Development and Testing
Web Service Slicing for Regression Testing of Services
Cloud Service Evolution Analytics
Quality of Service and Service Level Agreement
Introduction to Cloud computing and Microsoft azureShravandeepYadav
Basic introduction to Cloud Computing and microsoft azure. Journey of Cloud computing. Journey of azure certification.Microsoft azure Services. Azure Subsricptions.
Third year diploma in Information technology
Security for Effective Data Storage in Multi CloudsEditor IJCATR
Cloud Computing is a technology that uses the internet and central remote servers to maintain data and
applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal
files at any computer with internet access. This technology allows for much more efficient computing by centralizing data
storage, processing and bandwidth. The use of cloud computing has increased rapidly in many organizations. Cloud computing
provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor
in the cloud computing environment, as users often store sensitive information with cloud storage providers but these providers
may be untrusted. Dealing with “single cloud” providers is predicted to become less popular with customers due to risks of
service availability failure and the possibility of malicious insiders in the single cloud. A movement towards “multi-clouds”, or in
other words, “interclouds” or “cloud-of clouds” has emerged recently. This paper surveys recent research related to single and
multi-cloud security and addresses possible solutions. It is found that the research into the use of multicloud providers to maintain
security has received less attention from the research community than has the use of single clouds. This work aims to promote the
use of multi-clouds due to its ability to reduce security risks that affect the cloud computing user.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
The Most great challenging in Cloud computing is Security. Here Security plays key role
in this paper proposed concept mainly deals with security at the end user access. While coming to the
end user access that are connected through the public networks. Here the end user wants to access his
application or services protected by the unauthorized persons. In this area if we want to apply
encryption or decryption methods such as RSA, 3DES, MD5, Blow fish. Etc.,
Whereas we can utilize these services at the end user access in cloud computing. Here there is
problem of encryption and decryption of the messages, services and applications. They are is lot of
time to take encrypt as well as decrypt and more number of processing capabilities are needed to use
the mechanism. For that problem we are introducing to use of cloud computing in SaaS model. i.e.,
scalable is applicable in this area so whenever it requires we can utilize the SaaS model.
In Cloud computing use of computing resources (hardware and software) that are delivered as a
service over Internet network. In advance earlier there is problem of using key size in various
algorithm like 64 bit it take some long period to encrypt the data.
Cloud computing is a model which uses the mixture concept of “software-as-a-service” and “utility computing”, and provides
various on-demand services in a convenient way requested end users. It is internet based where resources are shared and the
information is available for on demand service users. Security issue in Cloud computing is the important and critical issues
because the resources are distributed. Both the Cloud provider and the cloud consumer should be fully sure that the cloud is safe
enough from all the external threats so that the customer does not face any kind of problem like loss or theft of their valua ble
data. There is also a possibility where a malicious user can penetrate the cloud by imitate an authorized user, and affect with a
virus to the entire cloud and affects many customers who are sharing the infected cloud. In this paper we firstly lists the
parameters that affects the security of the cloud then it explores the security issues of cloud computing and the troubles faced by
providers and consumers about their data, privacy, and infected application and security issues. It also presents some security
solutions for tackling these issues and problems.
An efficient and secure data storage in cloud computing using modified RSA pu...IJECEIAES
Cloud Computing is the ability to improve the utility or train new human resources without investing in new infrastructure, or add capabilities to existence without the latest software licensing. It expanded the capabilities of Information Technology (IT). From the past few years, cloud computing has developed from a good business concept in the best rising sectors of the IT industry. But more information on individuals and companies was put in the cloud, and concerns began to think about how secure the cloud environment was. Despite cloud surrounding structures, enterprise users still do not want to expand their business in the cloud. Security reduces the growth of cloud computing and continues to spread the market with complexity with data privacy and data protection. The security of cloud computing has constantly been an significant aspect of improved quality of service from cloud service providers. Data storage in the cloud has a problem related to data security. However, cloud computing construct many new security challenges which have not been well examine. In order to ensure that the user's data in the cloud is secure, we have proposed an effective mechanism with a distinctive feature of data integrity and privacy. This paper focusing on problems relating to the cloud data storage techniques and security in virtual environment. We recommend a method for providing data storage and security in cloud using public key Cryptosystem, which uses the concept of the modified RSA algorithm to provide better security for the data stored in the cloud.
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
Abstract Data security and Access control is a challenging research work in Cloud Computing. Cloud service users upload there private and confidential data over the cloud. As the data is transferred among the server and client, the data is to be protected from unauthorized entries into the server, by authenticating the user’s and provide high secure priority to the data. So the Experts always recommend using different passwords for different logins. Any normal person cannot possibly follow that advice and memorize all their usernames and passwords. That is where password managers come in. The purpose of this paper is to secure data from unauthorized person using Security blanket algorithm.
An Examination of Effectuation Dimension as Financing Practice of Small and M...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Does Goods and Services Tax (GST) Leads to Indian Economic Development?iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Childhood Factors that influence success in later lifeiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Customer’s Acceptance of Internet Banking in Dubaiiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Consumer Perspectives on Brand Preference: A Choice Based Model Approachiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Student`S Approach towards Social Network Sitesiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Broadcast Management in Nigeria: The systems approach as an imperativeiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Study on Retailer’s Perception on Soya Products with Special Reference to T...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladeshiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Media Innovations and its Impact on Brand awareness & Considerationiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Customer experience in supermarkets and hypermarkets – A comparative studyiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Social Media and Small Businesses: A Combinational Strategic Approach under t...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Implementation of Quality Management principles at Zimbabwe Open University (...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. II (Mar – Apr. 2015), PP 59-66
www.iosrjournals.org
DOI: 10.9790/0661-17225966 www.iosrjournals.org 59 | Page
A Secure Framework for Cloud Computing With Multi-cloud
Service Providers
Monali Shrawankar, Prof. Mahendra Sahare
NRI Institute of Information Science and Technology Bhopal, (MP) India
NRI Institute of Information Science and Technology Bhopal, (MP) India
Abstract: Cloud computing conveys IT assets as a Service over web. The point of interest of cloud computing is
everlasting anyway it brings a ton of issues together with security. ensuring the security of cloud computing may
be a premier consider the computing climate, as clients generally store touchy data with cloud storage
suppliers, however these suppliers could likewise be untrusted Customers don't have to lose their delicate data
attributable to malignant insiders and programmers inside the cloud. Furthermore, the loss of administration
accessibility has created a few issues for an oversized scope of as of late. Information interruption system create
a few issues for the clients of distributed computing. The inverse issues like data burglary, data lost should be
overcome to supply higher administrations to the customers. It's resolved that the investigation into the
occupation of intercloud suppliers to deal with security has gotten less consideration from the examination
group than has the livelihood of single mists. Multi-cloud environment has capacity to scale back the dangers
further on the grounds that it will verify the security and responsibleness. We tend to propose protection and
security to cloud clients with less calculation cost and most astounding security. Amid this paper, we've made a
framework to give secure cloud data which will promise to stop security dangers confronting the cloud
computing group. This schema connected multi-clouds furthermore the blowfish algorithm to scale back the
chance information interruption furthermore the loss of administration accessibility inside the cloud and
assurance information honesty. By using that Multi-cloud architecture we tend to actualize cryptography and
coding of client data with 2 real clouds dropbox and cloudme. We tend to propose Blowfish algorithm as
partner in nursing sample of hearty security framework with higher execution as an occurrence the anticipated
multi-cloud schema.
Keywords: Cloud computing; single cloud; multi-clouds; cloud storage; data integrity; data intrusion; service
availability.
I. Introduction
1.1 CLOUD COMPUTING
Cloud computing can be depicted as the moving of enlisting assets like get ready force, framework and
limit assets from desktops and limited servers to significant data focuses encouraged by associations like
Amazon, Google, Microsoft et cetera. These profits are given to a customer or business on exceedingly
adaptable, adaptable and pay-as-you-use premise. Figure 1. shows a consistent dispersed registering structural
building. The two most crucial portions of disseminated registering building outline are:
1) Front end
2) Back end
The Front end is the part seen by the client i.e. the machine client. This incorporates the client's cross
segment and the sections used to get to the cloud by method for a customer interface, for instance, a World
Wide Web program. The Back end of the disseminated registering structural arranging is the "cloud" itself,
including grouped machines servers and data stockpiling contraptions. As showed in Fig.1, The cloud
incorporates levels for the most part the back-end levels and the front –end or client –end levels. The front-end
levels are the ones you witness and join with when you get to your web message on Gmail for example. You are
utilizing ventures running on the front-end of a cloud. The same is genuine when you get to your face book
account. The Back-end incorporates the fittings and programming development demonstrating that invigorates
the interface you sight front end. Since the machines are arranged up to work at the same time, the applications
can exploit all that enlisting power just as they were running on one particular machine.
2. A Secure Framework for Cloud Computing With Multi-cloud Service Providers
DOI: 10.9790/0661-17225966 www.iosrjournals.org 60 | Page
Figure 1. Cloud computing architecture
Cloud computing additionally allows for a ton of adaptability, relying on the interest, you can help how
a great part of the cloud resources you use without the requirement for allocating particular equipment for the
occupation or simply diminish the recompense of advantages apportioned to you when are not vital. Cloud
administration suppliers ought to guarantee the clients' administration base. The utilization of distributed
computing Subashini and Kavitha [1] contend administrations for various reasons including in light of the fact
that this administration supply quick get to the applications and lessening administration charges. Cloud
computing suppliers ought to address security and security as issue for higher and dire primary concerns. The
considering with "single cloud‟ providers[13] is advancing less famous administration with clients because of
guarantee troubles, for example, administration availability disappointment for quite a while and pernicious
insider's assaults in the single cloud. So now single cloud move towards multi clouds, ‟interclouds‟ or" billow of
clouds.
1.2 The Proposed Objective
This paper proposed a model which first checks trustworthiness of clients information utilizing
Byzantine fault tolerance algorithm and discover flaw cloud in multi-cloud building design. In the wake of
getting trustworthiness acceptance it applies encryption and unscrambling to client information with cloud
storage suppliers. So once the information is put away in the application it is get scrambled and transferred to
cloud storage supplier in encoded structure. This encoded information won't be available to outside clients.
Therefore the capacity of the information will be in the encoded arrangement and the heads and the staffs have
no learning about the scrambled keys and the storage suppliers of the encryption and decryption.
1.3. Proposed Objective Discussion
In cloud computing, the information will be put away given by storage suppliers. They must have a
feasible approach to secure their customers' information, particularly to keep the information from revelation by
unapproved insiders. Putting away the information in encoded structure is a typical technique for data security
insurance. In the event that a cloud framework is in charge of both errands on capacity and
encryption/decryption of information, the framework heads might at the same time acquire scrambled
information and decoding keys. This permits them to get to data without approval and accordingly represents a
danger to data protection.
1.4 Applied Methodology
To apparatus the proposed band-aid of the botheration that is getting taken affliction of in this a
priorism work, the afterward alignment is used:
• To assay the assorted absolute Security Algorithm and acquisition their strengths and weakness by the abstract
survey.
• To analyze the absolute techniques.
• A defended multi-cloud archetypal for billow accretion based on the abstraction of amid the encryption and
decryption account from the online accumulator service.
II. Literature Review
Cloud computing is one of the fastest growing articulation of IT industry today .Companies are more
application Cloud computing for their business. Cloud computing has become a above allotment in today's IT
sector. They charge to assurance the Cloud provider that their advice will not be misused. With Cloud users and
companies are common victims of hacking and abstracts loss. Hence It is all important to assay the aegis issues
in Cloud computing and accomplish it defended and safe. [4]
3. A Secure Framework for Cloud Computing With Multi-cloud Service Providers
DOI: 10.9790/0661-17225966 www.iosrjournals.org 61 | Page
2.1. Data Privacy In The Cloud
In the Cloud computing environment, the accessories acclimated for business operations can be busy
from a individual account provider forth with the application, and the accompanying business abstracts can be
stored on accessories provided by the aforementioned account provider. Storing the company’s abstracts on the
account provider’s accessories raises the achievability that advice may be break appear to others. Some advisers
accept appropriate that user abstracts stored on account provider’s accessories accept to be encrypted. However,
if the decryption key and the encrypted abstracts are captivated by the aforementioned account provider, the
high-level administrators aural the account provider would accept admission to both the decryption key and
encrypted data, appropriately presenting a accident for the crooked acknowledgment of the user abstracts and
may actualize vulnerability to clandestine data.
2.2. Existing Methods For Protection
In absolute Cloud computing mechanisms, client’s data is encrypted afore storage. Applicant affidavit
action occurs above-mentioned to accumulator or retrieval. All the advice channels are encrypted for defended
data transmission. Common data encryption methods cover symmetric (private or secret key encryption) and
asymmetric (public key encryption) cryptography algorithms. In case of symmetric cryptography a secret key is
acclimated for both encryption and decryption. In the added duke asymmetric key cryptography uses two altered
keys, “public key” for encryption and “private key” for decryption. Some of the symmetric key algorithms are
Data Encryption Standard (DES), Triple Data Encryption Standard (3-DES), and Advance Encryption Standard
(AES) [3] etc. asymmetric key algorithms are RSA cryptography [4] and Elliptic Curve Cryptography (ECC)
[5]. Countersign affidavit is a accepted affidavit action acclimated by every cloud service provider (CSP).
During registration, applicant gives own user id and countersign and these will abundance anon in countersign
book of database.
III. Proposed Methodology
3.1 Proposed System Architecture
Figure 2. Is an overview of the architectonics where storage and encryption/decryption/hash casework
(security services) are separated. For example small and medium calibration business who ambition to
abundance all its annual accompanying data in cloud storage, will aboriginal account the assortment of the data,
encrypt the data application encryption account and again abundance the data storage provided by service
provider. The arrangement a swell provides functionality area added users from baby calibration business
Company will be able to admission abstracts which is stored in cloud storage. The sessions amid applicant and
security server is anchored application Key and Blowfish as the encryption algorithm.
Figure 2. Proposed system architecture
3.2 Proposed Algorithm
This security framework for Cloud Computing is based on two algorithms. The concept uses multi-clouds for
security purpose so four CSPs are designed for every cloud client to transfer data from one CSP to another.
3.2.1 Algorithm-I: Integrity verification with Byzantine fault tolerance algorithm
This algorithm (BFT) provides safety and liveness over an multi-cloud model.
a) Safety: the system maintains state and looks to the client like a non-replicated remote service. Safety
includes a total ordering of requests.
b) Liveness: clients will eventually receive a reply to every request sent, provided the network is functioning.
It is based on state machine replication and messages signed by public key cryptography. Message digests
created using collision-resistant hash functions and uses consensus and propagation of system views: state is
only modified when the functioning replicas agree on the change
● For n clients, there are n 'views', {0..n-1}.
4. A Secure Framework for Cloud Computing With Multi-cloud Service Providers
DOI: 10.9790/0661-17225966 www.iosrjournals.org 62 | Page
● In view i, node i is the primary node
● View change is increment mod n
● View change occurs when 2f nodes believe the primary has failed
● Guaranteed safety and liveness provided less than
n−1
4
= f replicas have failed.
● Step 1: The client sends a request to the primary cloud.
● Step 2: The primary assigns the request a sequence number and broadcasts this to all replicas (pre-prepare).
● Step 3: The replicas acknowledge this sequence number (prepare).
● Step 4: Once 2f prepares have been received, a client broadcasts acceptance of the request (commit).
● Step 5: Once 2f +1 commits have been received, a client places the request in the queue.In a non-faulty
client, the request
● queue will be totally ordered by sequence number.
● Step 6: Once all prior requests have been completed, the request will be executed and the result sent
directly to the client.
● Step 7: All these messages are logged.[10]
3.2.2 Algorithm-II: Encryption and decryption with Blowfish algorithm
Blowfish uses a ample amount of subkeys. These keys have to be precomputed afore any abstracts encryption or
decryption. The A-array consists of 18 32-bit subkeys : A1, A2,..., A18. There are four 32-bit S-boxes with 256
entries each:
S1,0, S1,1,..., S1,255;
S2,0, S2,1,..,, S2,255;
S3,0, S3,1,..., S3,255;
S4,0, S4,1,..,, S4,255.
Encryption: Blowfish is a Feistel arrangement consisting of 16 circuit
The ascribe is a 64-bit abstracts element, x.
Divide x into two 32-bit halves: xL, xR
For i = 1 to 16:
xL = xL XOR Ai
xR = F(xL) XOR xR
Swap xL and xR
Swap xL and xR (Undo the endure swap.)
xR = xR XOR A17
xL = xL XOR A18
Recombine xL and xR
Function F (): Divide xL into four eight-bit quarters: a, b, c, and d F(xL) = ((S1,a + S2,b mod 232) XOR S3,c) +
S4,d mod 232 Decryption is absolutely the aforementioned as encryption, except that A1, A2,..., A18 are
acclimated in the about-face order. Implementations of Blowfish that crave the fastest speeds should disclose the
bend and ensure that all sub keys are stored in cache.
The subkeys are affected application the Blowfish algorithm. The exact adjustment is as follows:
Initialize aboriginal the P-array and again the four S-boxes, in order, with a anchored string. This cord consists
of the hexadecimal digits of pi (less the antecedent 3).
For example:
A1 = 0x243f6a88
A2 = 0x85a308d3
A3 = 0x13198a2e
A4 = 0x03707344
XOR A1 with the aboriginal 32 $.25 of the key, XOR A2 with the additional 32-bits of the key, and so on for all
$.25 of the key (possibly up to A14). Repeatedly aeon through the key $.25 until the absolute A-array has been
XORed with key bits. (For every abbreviate key, there is at atomic one agnate best key; for example, if A is a
64-bit key, again AA, AAA, etc., are agnate keys.)
Encrypt the all-zero cord with the Blowfish algorithm, application the subkeys declared in accomplish (1) and
(2). Replace A1 and A2 with the achievement of footfall (3).
Encrypt the achievement of footfall (3) application the Blowfish algorithm with the adapted subkeys.
Replace A3 and A4 with the achievement of footfall (5) Continue the process, replacing all entries of the A-
array, and again all four S-boxes in order, with the achievement of the continuously-changing Blowfish
algorithm. In total, 521 iterations are appropriate to accomplish all appropriate subkeys. [8]
5. A Secure Framework for Cloud Computing With Multi-cloud Service Providers
DOI: 10.9790/0661-17225966 www.iosrjournals.org 63 | Page
IV. Implementation Review
The concept is based on checking data integrity and encryption/decryption of user data, as shown in
Figure 3. In this model, two modules are designed for double security purposes. First module named as Integrity
verification module which uses Byzantine fault tolerance algorithm. Second module named as
Encryption/decryption module which uses blowfish algorithm with real clouds as dropbox and cloudme. Both
these clouds are online storage clouds where cloud users can store their data in a secured manner.
Figure 3: Workflow of a proposed architecture
4.1 Data Retrieval From Cloud Service Provider
When a user wants to access the online Cloud Service, accept to aboriginal assassinate the Login
Program as apparent in step 1. This step can use accepted e-commerce or added casework which accept already
deeply absolute the user’s registration, such as symmetric key-based claiming and acknowledgment login
verification, or through a One-Time Password. After the user’s login has been auspiciously verified, if the
System requires applicant advice from the user, it sends a appeal for advice to the Storage Service System, as
apparent in step 2. In this step, the System transmits the user ID to the Storage Service System area it searches
for the user’s data. This data is encrypted so, already found, a appeal accept to be beatific to the
Encryption/Decryption Service System forth with user ID. step 3 shows the Storage Service System active the
manual of encrypted applicant data and the user ID to the Encryption/Decryption Service System. Since the
Encryption /Decryption Service System can serve assorted users and the encryption/decryption for anniversary
user’s data requires a different key, accordingly user’s different ID and keys are stored together. Therefore, in
step 4, the Encryption/Decryption Service System uses the accustomed user ID to basis the user’s data
decryption key, which is again acclimated to break the accustomed data. Using the actual decryption key to
break the data is analytical to abating the data to its aboriginal state. After the Encryption/Decryption Service
System has decrypted the client’s data, in step 5 the decrypted user data is provided in step 6, commutual the
Data Retrieval Program.
Figure 4: Data Retrieval from Cloud Service Provider
Next, we describe the Data Storage Program, as shown in Fig. 5. This program also involves the
collaboration of three cloud service systems: Security cloud, Encryption/Decryption Service System, and
Storage Service System.
6. A Secure Framework for Cloud Computing With Multi-cloud Service Providers
DOI: 10.9790/0661-17225966 www.iosrjournals.org 64 | Page
Figure 5: Data storage diagram
Step 1 of Fig. 5 shows the client sending a Data Storage Request to the security cloud which then
initiates the Data Storage Program, requesting data encryption from the cryption/Decryption Service System as
shown in Step 2. In Step 2, the security cloud and the Encryption/Decryption Service System establish a secure
data transfer channel to transmit the user ID and the data requiring storage from the security cloud to the
Encryption/Decryption Service System.
V. End Results & Upshot
This section illustrates the highest outcome & upshots that square measure bought with the aid of
jogging the procedure victimization absolutely one-of-a-kind information plenty. The results exhibit
nevertheless understanding is secure in Cloud service supplier facet atmosphere. Following determine illustrate
cloud client browse understanding which is ready to get keep on cloud service provider.
Figure 6: cloud client browse data
Once the data is browsed then byzantine fault tolerance algorithm is applied to check data integrity as illustrated
in figure
Figure 7: Data integrity verification
Once the default cloud found, then blowfish algorithm applied to data to encrypt and upload on csp1 i.e;
dropbox cloud service provider as illustrated in figure.
7. A Secure Framework for Cloud Computing With Multi-cloud Service Providers
DOI: 10.9790/0661-17225966 www.iosrjournals.org 65 | Page
Figure 7: Encrypted Data in CSP1 as Dropbox real cloud
Again applying BFT algorithm, data integrity verified. then blowfish algorithm applied to data to encrypt and
upload on csp2 i.e; cloudme cloud service provider as illustrated in figure.
Figure 8: Encrypted Data in CSP2 as Cloudme real cloud
Figure 9: Comparison length in bits for various common symmetric encryption algorithms for Cloud
Computing
Figure 10: Comparison security for various common symmetric encryption algorithms for Cloud Computing
Table 1. Comparison Of Blow-Fish With Different Algorithm In Cloud Computing
Algorithm Data Time(In Seconds) Average MB/Sec Performance
DES 256 MB 10-11 22-23 Low
3DES 256 MB 12 12 Low
AES 256 MB 5 512 Medium
Blowfish 256 MB 3.5-4 64 High
8. A Secure Framework for Cloud Computing With Multi-cloud Service Providers
DOI: 10.9790/0661-17225966 www.iosrjournals.org 66 | Page
VI. Conclusion
It's clear that whereas the use of cloud computing has rapidly developed; cloud computing protection is
still considered the main matter in the cloud computing traditional atmosphere. Customers don't need to
misplace their private knowledge as a final result of malicious insiders within the cloud. In supplement, the slash
of provider availability has initiated many difficulties for a significant quantity of purchasers lately. In addition,
data intrusion directs to numerous problems for the customers of cloud computing. In this paper, we have now
proposed answers for three most trendy safety threats in cloud storage. We now have confirmed that our
approach performs better in decreasing the safety threat on cloud For cloud computing to unfold, customers
need to have a high degree of believe in the methods by which provider providers guard their knowledge. This
learn proposes a Multi-cloud model for Cloud Computing situated on a Separate Encryption and Decryption
service, emphasizing that authorization for the storage and encryption/decryption of user information must be
vested with two distinctive carrier providers. On this new model, person knowledge in the Storage provider
method is all saved encrypted. Without the decryption key, there is no approach for the provider supplier to
access the consumer information. Inside the Encryption/Decryption provider approach there is not any stored
consumer data, hence removing the probability that person data probably improperly disclosed.
VII. Future Scopes
The info storage security in Cloud Computing, an area stuffed with challenges and of paramount
significance, are nonetheless in its infancy now, and plenty of research problems are yet to be identified is to
enhance the extra protection points by using making use of different stronger systems of data protection via
cryptosystems and other approaches. Cloud computing does provide us with tangible advantages however today
we still haven't any definite solutions on a proper protection platform for cloud computing, best
recommendations and theories are being fashioned but we're but to see a practical protection measure for cloud
computing to be a safer platform for businesses and members.
References
[1]. S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing", Journal of Network and
Computer Applications, 34(1), 2011, pp 1-11.
[2]. “Cloud security An enterprise perspective” Hewlett-Packard Development Company, L.P. The information, 2012. Available from
https://h30613.www3.hp.com/media/files/.../BB237 _Nielson.pdf
[3]. O.P. Verma, “Performance analysis of data Encryption Algorithm”, IEEE 3rd International Conference on Electronics Computer
Technology (ICECT), vol.5, April 2011, pp. 399-403.
[4]. R. Rivest, A. Shamir and L. Adleman, “A method for obtaining digital signatures and public key cryptosystems”, Communications
of the ACM, vol. 21, No.2, 1978, pp. 120-126.
[5]. Miller, “Uses of elliptic curves in cryptography”, Advances in cryptology-CRYPTO ’85, Lecture Notes in Computer science, 1986,
pp. 417- 426.
[6]. M. Vukolic,"The Byzantine empire in the intercloud", ACM SIGACT News, 41,2010, pp. 105-111
[7]. Bessani, M. Correia, B. Quaresma, F. André and P. Sousa, "DepSky: dependable and secure storage in a cloud-of-clouds",
EuroSys'11:Proc. 6thConf. On Computer systems, 2011, pp. 31-46.
[8]. Atul Kahate “Cryptography and Network Security”, Tata Mc-graw Hill, 3rd Edition 2008
[9]. ”Cloud computing security: From Single to Multi-clouds”, Department of Computer Science and Computer Engineering, La Trobe
University, Bundoora 3086, Australia. Mohammed A. AlZain, Eric Pardede, Ben Soh,James A.
[10]. G.R. Goodson, J.J. Wylie, G.R. Ganger and M.K. Reiter, "Efficient Byzantine-tolerant erasure-coded storage",DSN'04: Proc.Intl.
Conf. on Dependable Systems and Networks,2004, pp.1-22.