Abstract Cloud computing is one of the popular enterprise models where computing resources are made available on-demand to the user as needed. Due to this increasing demand for more clouds there is an ever growing threat of security becoming a major issue. cloud computing is a construct that allows you to access applications that actually reside at a location other than your computer or other Internet-connected device, most often, this will be a distant data center. In a simple, topological sense, a cloud computing solution is made up of several elements: clients, the datacenter, and distributed servers. Each element has a purpose and plays a specific role in delivering a functional cloud based application, the increased degree of connectivity and the increasing amount of data has led many providers and in particular data centers to employ larger infrastructures with dynamic load and access balancing. So this paper shall look at ways in which security responsibilities and Cloud Adoption Keywords: Cloud Computing, Service models, Cloud Security, Secure Cloud Adoption,
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSIJNSA Journal
Cloud computing is a new innovative model for enterprise in which information is permanently stored on the servers and also manage how and when different resources are allocate to the requested users. It provides distributed approach through which resources are allocated dynamically to the users without investing in the infrastructure or licensing the software’s on the client side. Using the cloud makes processing of information is more commodious but it also present them with new security problems about reliability.This phenomenon introduces serious problems regarding access mechanism to any information stored in the database and resources in the cloud. For the successful implementation of cloud computing it is necessary that we must know different areas where the security is needed. For this there should also governess strategy needed for secure communication between multi-clouds located in different geographical areas or in different countries. In this paper we discuss how to safely utilizing the benefit of cloud computing through the network where data security, provide authentication, integration, recovery, IP spoofing and Virtual Servers are the most captiousfields in the cloud.
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...IJERA Editor
In this paper, SMCSaaS is proposed to secure email system based on Web Service and Cloud Computing
Model. The model offers end-to-end security, privacy, and non-repudiation of PKI without the associated
infrastructure complexity. The Proposed Model control risks in Cloud Computing like Insecure Application
Programming Interfaces, Malicious Insiders, Data Loss Shared Technology Vulnerabilities, or Leakage,
Account, Service, Traffic Hijacking and Unknown Risk Profile
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
Cloud computing is a model for enabling convenient, on-demand network access
to a shared pool of configurable computing resources. Reliability in compute cloud is an
important aspect in Quality of Service which needs to be addressed in order to foster the
adoption of compute cloud. In today’s integrated environment the distributed systems is
employed to carry out computational intensive task at a faster rate without much
investment. The Cloud is a multitenant architecture which allows faster computation with
high scalability at a lower cost thereby the users can share the same physical infrastructure.
Individual customers deploy their applications in such environment will occupy the virtual
partitions on the platform. This paper describes a straightforward procedure to analyze the
reliability of the application from the view point of the resource provider. A trust
component is implemented to provide preventive control and to mitigate the occurrence of
any non-permissible action by using the detective mechanism. Such mechanisms are used to
identify the privacy risk and it further prevents from utilization. Hence, in this paper trust
assessment is performed before the user is allowed to share the multitenant infrastructure.
The cloud can provide scalable and reliable service for the legitimate users. The proposed
work is tested using tools Aneka and Globus Toolkit.
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSIJNSA Journal
Cloud computing is a new innovative model for enterprise in which information is permanently stored on the servers and also manage how and when different resources are allocate to the requested users. It provides distributed approach through which resources are allocated dynamically to the users without investing in the infrastructure or licensing the software’s on the client side. Using the cloud makes processing of information is more commodious but it also present them with new security problems about reliability.This phenomenon introduces serious problems regarding access mechanism to any information stored in the database and resources in the cloud. For the successful implementation of cloud computing it is necessary that we must know different areas where the security is needed. For this there should also governess strategy needed for secure communication between multi-clouds located in different geographical areas or in different countries. In this paper we discuss how to safely utilizing the benefit of cloud computing through the network where data security, provide authentication, integration, recovery, IP spoofing and Virtual Servers are the most captiousfields in the cloud.
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...IJERA Editor
In this paper, SMCSaaS is proposed to secure email system based on Web Service and Cloud Computing
Model. The model offers end-to-end security, privacy, and non-repudiation of PKI without the associated
infrastructure complexity. The Proposed Model control risks in Cloud Computing like Insecure Application
Programming Interfaces, Malicious Insiders, Data Loss Shared Technology Vulnerabilities, or Leakage,
Account, Service, Traffic Hijacking and Unknown Risk Profile
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
Cloud computing is a model for enabling convenient, on-demand network access
to a shared pool of configurable computing resources. Reliability in compute cloud is an
important aspect in Quality of Service which needs to be addressed in order to foster the
adoption of compute cloud. In today’s integrated environment the distributed systems is
employed to carry out computational intensive task at a faster rate without much
investment. The Cloud is a multitenant architecture which allows faster computation with
high scalability at a lower cost thereby the users can share the same physical infrastructure.
Individual customers deploy their applications in such environment will occupy the virtual
partitions on the platform. This paper describes a straightforward procedure to analyze the
reliability of the application from the view point of the resource provider. A trust
component is implemented to provide preventive control and to mitigate the occurrence of
any non-permissible action by using the detective mechanism. Such mechanisms are used to
identify the privacy risk and it further prevents from utilization. Hence, in this paper trust
assessment is performed before the user is allowed to share the multitenant infrastructure.
The cloud can provide scalable and reliable service for the legitimate users. The proposed
work is tested using tools Aneka and Globus Toolkit.
Cloud Computing is benefiting to both cloud hosts and consumers by providing elastic services as a utility. These
services are provided on the basis of Service Level Agreement (SLA). Security and privacy are major issues when dealing with a multi - tenant model of cloud. Consumers are provided computing power in terms of virtual machines (VMs). A consumer can have many VMs at a time. Multiple consumers can get different VMs from the same server. This may lead to cross-VM attacks. This paper introduces a new framework: SAFETY (Security Awareness Framework for Everyone's Task with You), for maintaining security from cross-VM attacks, Data
leakage, VM theft, VM escape, Hyper jacking and VM Hopping. Experiments and results show that this framework is suitable and can be used for secure operations at cloud host side.
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Overview of cloud computing architectureeSAT Journals
Abstract
This Research paper explores cloud computing architecture, service delivery models, Security & Privacy Issues and Trust Challenges. Evaluates all three service delivery models Software-as-a-Service (Saas), Platform-as-a-Service (PaaS) and Infrastructure-as-a-service (IaaS) and their deployment, requirements and services they provide. In the next section Security & Privacy Issues has been discussed and focus is on potential reasons for them to cause. Also discusses the lack of common cloud security standards with constructive discussion on public cloud providers and on their proprietary security standards. Overview on Challenges with Trust between Cloud provider and cloud user and suggests solutions for inculcating trust among cloud provider and cloud user with the help of trusted thrid party. Solutions and recommendations are suggested to safeguard user Data in the cloud by implementing Data security measures such as use of Crypotography and Trusted platform module (TPM), Data integrity etc. This research paper also focuses on future scope of cloud computing and its evolution in the field of outsourcing and urges on the need of global security standards for mitigating security issues, privacy threats and Trust challenges for wide acceptance of cloud computing in organizations. Keywords: Cloud Computing Challenges, Service Delivery Models, Data Security, Security & Privacy Issues, Trust
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Enhancing security features in cloud computing for healthcare using cipher an...eSAT Journals
Abstract Health Care is the most important unindustrialized field. Cloud is an emerging trend in software industry. In medical field, there are large dataset comprising highly sensitive data about patient’s medical records. Based on these records, diagnosis for the patient will be given. Moving data to the cloud makes to explore a large information for diagnosis as expert documentation will also be stored as part of health record. Physicians from anywhere at any time can get access over these reports for better treatment. The Medicare industry vacillates to store these data to the cloud as the patients might feel insecure about their health records. This work introduces the idea of combining Cipher Cloud, Inter Cloud and ABE schemes, proposes an innovative method to enhance security features in the cloud by double encryption using algorithms and tools. By this, only authorized entities are proficient of accessing these records. Rather than storing data in single cloud, Inter Cloud (Multi-cloud) also adds advantage for our proposed work. Keywords: Virtualization, Cipher cloud, Trust, Encryption, Inter cloud
Enhancing security features in cloud computing for healthcare using cipher an...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMIJNSA Journal
Classic firewall systems are built to filter traffic based on IP addresses, source and destination ports and protocol types. The modern networks have grown to a level where the possibility for users’ mobility is a must. In such networks, modern firewalls may introduce such complexity where administration can become very frustrating since it needs the intervention of a firewall administrator. The solution for this problem is an identity based firewall system. In this paper we will present a new
design of a firewall system that uses the user’s identity to filter the traffic. In the design phase we will define key points which have to be satisfied as a crucial milestone for the functioning of the whole Identity based firewall system.
A challenge for security and service level agreement in cloud computingeeSAT Journals
Abstract One of the most promising field in computing is regarded as cloud computing, which allows users to store their data virtually over the cloud without the need of any fixed infrastructure. It offer user to manipulate their data regardless of the geographical position, hence providing a scalable, feasible and flexible way to connect user to their data. The cloud can be considered as of the Internet where data are usually stored and computing refers to the applications and services that it can provide. Users are connected to cloud by Cloud Service Providers through the Internet connection. Both users and cloud service provider agree on a protocol known as service level agreements for exchange of information. Cloud computing provides increase in capacity and grants the capability to perform computation on cloud infrastructure to its users. Cloud Computing is capable of providing more convenient communication and instant multi-point collaboration feature. Cloud computing provides better utilization of distributed resource over large amount of data and they can be access remotely through the internet. Quality of service should be kept in mind will designing the service level agreement. There are many problem related to cloud computing such as traffic managements, security and privacy. This paper provides a survey on the basic working principle of clouding computing. This paper provides an overview of the cloud architecture including the different types and level of clouds services. In this paper focus has been made upon the service level agreement, issue and security prospectus over the cloud computing. Keywords: Architecture, Cloud Computing, Cloud Security, Cloud Services Service Level Agreements
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Cloud computing is a progressive innovation that has achieved new extravagances in the field of
Information Technology. It gives a wellspring of information and application programming stockpiling as
colossal server farms called 'mists', which can be gotten to with the assistance of a system association.
These mists boost the capacities of undertakings with no additional set-up, faculty or permitting costs.
Mists are for the most part sent utilizing Public, Private or Hybrid models relying on the necessities of the
client. In this paper, we have explored the distributed computing engineering, concentrating on the
elements of the Public, Private and Hybrid cloud models. There is a dire need to examine the performance
of a cloud environment on several metrics and enhance its usability and capability. This paper aims at
highlighting important contributions of various researchers in domains like computational power,
performance provisioning, Load balancing and SLAs.
Co channel deployment cross layer approach for lte heterogeneous networkseSAT Journals
Abstract
Nowadays Heterogeneous Networks (HetNets) are envisioned as the major capacity and performance enhancement enablers by
means of increasing the spectral efficiency per unit area. In LTE, since pico cells typically share the frequency band as macro
cells, the performance of a low-power pico access node could be severely impaired by interference from a high power macro
access node. In co-channel deployment it is necessary to balance the load and Share the resources between the different layers,
where macro and pico cells share the same carrier frequency. In this case, one of the main problem that need to be addressed in
order to improve the network performance is: Cell selection. For this reason we propose a throughput-based cell selection
algorithm. This algorithm targets to optimize the throughput of each user.
Keywords: LTE, Heterogeneous Networks, Macro cell, Pico cell and Co-Channel Deployment.
Cloud Computing is benefiting to both cloud hosts and consumers by providing elastic services as a utility. These
services are provided on the basis of Service Level Agreement (SLA). Security and privacy are major issues when dealing with a multi - tenant model of cloud. Consumers are provided computing power in terms of virtual machines (VMs). A consumer can have many VMs at a time. Multiple consumers can get different VMs from the same server. This may lead to cross-VM attacks. This paper introduces a new framework: SAFETY (Security Awareness Framework for Everyone's Task with You), for maintaining security from cross-VM attacks, Data
leakage, VM theft, VM escape, Hyper jacking and VM Hopping. Experiments and results show that this framework is suitable and can be used for secure operations at cloud host side.
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Overview of cloud computing architectureeSAT Journals
Abstract
This Research paper explores cloud computing architecture, service delivery models, Security & Privacy Issues and Trust Challenges. Evaluates all three service delivery models Software-as-a-Service (Saas), Platform-as-a-Service (PaaS) and Infrastructure-as-a-service (IaaS) and their deployment, requirements and services they provide. In the next section Security & Privacy Issues has been discussed and focus is on potential reasons for them to cause. Also discusses the lack of common cloud security standards with constructive discussion on public cloud providers and on their proprietary security standards. Overview on Challenges with Trust between Cloud provider and cloud user and suggests solutions for inculcating trust among cloud provider and cloud user with the help of trusted thrid party. Solutions and recommendations are suggested to safeguard user Data in the cloud by implementing Data security measures such as use of Crypotography and Trusted platform module (TPM), Data integrity etc. This research paper also focuses on future scope of cloud computing and its evolution in the field of outsourcing and urges on the need of global security standards for mitigating security issues, privacy threats and Trust challenges for wide acceptance of cloud computing in organizations. Keywords: Cloud Computing Challenges, Service Delivery Models, Data Security, Security & Privacy Issues, Trust
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Enhancing security features in cloud computing for healthcare using cipher an...eSAT Journals
Abstract Health Care is the most important unindustrialized field. Cloud is an emerging trend in software industry. In medical field, there are large dataset comprising highly sensitive data about patient’s medical records. Based on these records, diagnosis for the patient will be given. Moving data to the cloud makes to explore a large information for diagnosis as expert documentation will also be stored as part of health record. Physicians from anywhere at any time can get access over these reports for better treatment. The Medicare industry vacillates to store these data to the cloud as the patients might feel insecure about their health records. This work introduces the idea of combining Cipher Cloud, Inter Cloud and ABE schemes, proposes an innovative method to enhance security features in the cloud by double encryption using algorithms and tools. By this, only authorized entities are proficient of accessing these records. Rather than storing data in single cloud, Inter Cloud (Multi-cloud) also adds advantage for our proposed work. Keywords: Virtualization, Cipher cloud, Trust, Encryption, Inter cloud
Enhancing security features in cloud computing for healthcare using cipher an...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMIJNSA Journal
Classic firewall systems are built to filter traffic based on IP addresses, source and destination ports and protocol types. The modern networks have grown to a level where the possibility for users’ mobility is a must. In such networks, modern firewalls may introduce such complexity where administration can become very frustrating since it needs the intervention of a firewall administrator. The solution for this problem is an identity based firewall system. In this paper we will present a new
design of a firewall system that uses the user’s identity to filter the traffic. In the design phase we will define key points which have to be satisfied as a crucial milestone for the functioning of the whole Identity based firewall system.
A challenge for security and service level agreement in cloud computingeeSAT Journals
Abstract One of the most promising field in computing is regarded as cloud computing, which allows users to store their data virtually over the cloud without the need of any fixed infrastructure. It offer user to manipulate their data regardless of the geographical position, hence providing a scalable, feasible and flexible way to connect user to their data. The cloud can be considered as of the Internet where data are usually stored and computing refers to the applications and services that it can provide. Users are connected to cloud by Cloud Service Providers through the Internet connection. Both users and cloud service provider agree on a protocol known as service level agreements for exchange of information. Cloud computing provides increase in capacity and grants the capability to perform computation on cloud infrastructure to its users. Cloud Computing is capable of providing more convenient communication and instant multi-point collaboration feature. Cloud computing provides better utilization of distributed resource over large amount of data and they can be access remotely through the internet. Quality of service should be kept in mind will designing the service level agreement. There are many problem related to cloud computing such as traffic managements, security and privacy. This paper provides a survey on the basic working principle of clouding computing. This paper provides an overview of the cloud architecture including the different types and level of clouds services. In this paper focus has been made upon the service level agreement, issue and security prospectus over the cloud computing. Keywords: Architecture, Cloud Computing, Cloud Security, Cloud Services Service Level Agreements
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Cloud computing is a progressive innovation that has achieved new extravagances in the field of
Information Technology. It gives a wellspring of information and application programming stockpiling as
colossal server farms called 'mists', which can be gotten to with the assistance of a system association.
These mists boost the capacities of undertakings with no additional set-up, faculty or permitting costs.
Mists are for the most part sent utilizing Public, Private or Hybrid models relying on the necessities of the
client. In this paper, we have explored the distributed computing engineering, concentrating on the
elements of the Public, Private and Hybrid cloud models. There is a dire need to examine the performance
of a cloud environment on several metrics and enhance its usability and capability. This paper aims at
highlighting important contributions of various researchers in domains like computational power,
performance provisioning, Load balancing and SLAs.
Co channel deployment cross layer approach for lte heterogeneous networkseSAT Journals
Abstract
Nowadays Heterogeneous Networks (HetNets) are envisioned as the major capacity and performance enhancement enablers by
means of increasing the spectral efficiency per unit area. In LTE, since pico cells typically share the frequency band as macro
cells, the performance of a low-power pico access node could be severely impaired by interference from a high power macro
access node. In co-channel deployment it is necessary to balance the load and Share the resources between the different layers,
where macro and pico cells share the same carrier frequency. In this case, one of the main problem that need to be addressed in
order to improve the network performance is: Cell selection. For this reason we propose a throughput-based cell selection
algorithm. This algorithm targets to optimize the throughput of each user.
Keywords: LTE, Heterogeneous Networks, Macro cell, Pico cell and Co-Channel Deployment.
GANHE R$ 40,00 a R$ 200,00 POR SEMANA CLICANDO EM BANNERS NA INTERNET!
AGORA COM O SISTEMA FILA ÚNICA ONDE INDICAMOS PARA VOCÊ!
GARANTA O SEU LUGAR NA FILA E COMECE A GANHAR!
www.adsgoldconquista.com
Fea analysis and optimization of an one way clutch used in automatic transmis...eSAT Journals
Abstract An intent of this project is to reduce the weight of one way clutch which is being used in automotive transmission enabled sports cars. By reducing the weight we can achieve better efficiency in terms of strength and also to increase the transmission power from torque converter wherein which engaging and disengaging happens. One way roller clutch is one, when the unit rotates in one direction the rollers slip or free-wheel, but when a torque is applied in the opposite direction, the rollers lock between outer cage (cam) and inner cage, producing a wedging action and binding because of friction. The rollers are spring-loaded. Design parameters like maximum torsional deflection, minimum hoop`s stress are considered for to get increased efficiency. In order to achieve this FEA analysis and optimization technique is carried here. Optimization is the mathematical discipline which is concerned with finding the maxima and minima of functions, possibly subject to constraints. Here optimization is carried out by using the global parameters optimization technique. Keywords: FEA analysis, Global parameters, Minimum hoop`s stress, Weight
“Vinde a mim, todos que estais cansados e oprimidos, e Eu vos aliviarei.
Tomai sobre vós o Meu jugo, e aprendei de Mim, que Sou manso e humilde de coração; e encontrareis descanso para as vossas almas.
Porque o Meu jugo é suave e o Meu fardo é leve“
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Addressing the cloud computing security menaceeSAT Journals
Abstract Cloud Computing is fast gaining popularity today with its scalable, flexible and on-demand service provision. It brings cost saving and agility to organization with pay-as-you-go approach. Abundant resources are available and the user has a huge range to select from. Cloud facilitates virtualization, simplification, automation and accelerated delivery of application and services for a sustainable business advantage. As much as the technological benefit, cloud computing also has security issues. Security in cloud computing is essential for providing quality of service. In this paper we address security issues which concern cloud computing environment today. We analyze Cloud Computing and security menace it faces due to different threats. Index Terms: Cloud Computing, Cloud Service Provider (CSP), Cloud Security, Cloud User, SaaS, PaaS, IaaS, StaaS
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
Abstract Data security and Access control is a challenging research work in Cloud Computing. Cloud service users upload there private and confidential data over the cloud. As the data is transferred among the server and client, the data is to be protected from unauthorized entries into the server, by authenticating the user’s and provide high secure priority to the data. So the Experts always recommend using different passwords for different logins. Any normal person cannot possibly follow that advice and memorize all their usernames and passwords. That is where password managers come in. The purpose of this paper is to secure data from unauthorized person using Security blanket algorithm.
Survey on cloud computing security techniqueseSAT Journals
Abstract Cloud computing is one of the emerging technology in computer science field. It provides various services and resources, still enterprises are disinclined to invest their business in cloud computing. It is because of security issues it has. There are different service models in cloud computing and threats to security also have different. The characteristics that are must be ensured while thinking about data security in cloud computing are integrity, availability and confidentiality. In this paper we are surveying some of the Intrusion Detection and Prevention Systems (IDPS) and comparing them regarding their ability to provide data security. Keywords— Cloud Security, cloud computing, data security, IDPS
Ant colony Optimization: A Solution of Load balancing in Cloud dannyijwest
As the cloud computing is a new style of computing over internet. It has many advantages along with some
crucial issues to be resolved in order to improve reliability of cloud environment. These issues are related
with the load management, fault tolerance and different security issues in cloud environment. In this paper
the main concern is load balancing in cloud computing. The load can be CPU load, memory capacity,
delay or network load. Load balancing is the process of distributing the load among various nodes of a
distributed system to improve both resource utilization and job response time while also avoiding a
situation where some of the nodes are heavily loaded while other nodes are idle or doing very little work.
Load balancing ensures that all the processor in the system or every node in the network does
approximately the equal amount of work at any instant of time. Many methods to resolve this problem has
been came into existence like Particle Swarm Optimization, hash method, genetic algorithms and several
scheduling based algorithms are there. In this paper we are proposing a method based on Ant Colony
optimization to resolve the problem of load balancing in cloud environment.
A study secure multi authentication based data classification model in cloud ...IJAAS Team
Abstract: Cloud computing is the most popular term among enterprises and news. The concepts come true because of fast internet bandwidth and advanced cooperation technology. Resources on the cloud can be accessed through internet without self built infrastructure. Cloud computing is effectively managing the security in the cloud applications. Data classification is a machine learning technique used to predict the class of the unclassified data. Data mining uses different tools to know the unknown, valid patterns and relationshipsin the dataset. These tools are mathematical algorithms, statistical models and Machine Learning (ML) algorithms. In this paper author uses improved Bayesian technique to classify the data and encrypt the sensitive data using hybrid stagnography. The encrypted and non encrypted sensitive data is sent to cloud environment and evaluate the parameters with different encryption algorithms.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing types and the service delivery types.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Comparison of data security in grid and cloud computingeSAT Journals
Abstract In the current era, Grid computing and cloud computing are the main fields in the research work. This thesis define which are the main security issues to be considered in cloud computing and grid computing, and how some of these security issues are solved. Comparative study shows the grid security is tighter than the cloud. It also shows cloud computing is less secure and faced security problems. This research work is based on main security problems in cloud computing such as authentication, authorization, access control and security infrastructure (SLA). Cloud infrastructure is based on service level agreement; simply cloud providers provide different services to cloud’s users and organizations with an agreement known SLA. So the security and privacy of user’s data is the main problem, because unauthorized person can’t access the data of cloud user. Hacking and data leakage are the common threats in cloud computing. As the security due to hackers increase over internet and the cloud computing is totally on internet. At this time, cloud computing demand the tight password protection and strong authentication and authorization procedure. For an increased level of security, privacy and password protection, we provide a new strong authentication model named “Two factor authentications using graphical password with pass point scheme”. This authentication model includes the login procedure, access control that is based on service level agreement (SLA) in cloud computing. Index Terms: Cloud computing, Authentication, login, Recognition, Recall, Pass point, security, Cloud Provider, Service level Agreement, Two Factor Authentication
Services, security challenges and security policies in cloud computingeSAT Journals
Abstract Cloud computing is becoming most emerging trend in IT industry. With its potential growth and lucrative services cloud computing has acquired mass market in the industry large enterprises running their business on the cloud. A greater acceptance of public cloud by various businesses has given it a wide popularity, strengthening of public cloud security is big milestone. The public cloud acceptance is increasing along with the trust in public cloud at large extent. As the security is most vital factor in the cloud. Handovering data to the cloud service provider keeps cloud user tensed. Different threats have been discovered in recent years. Database security in public cloud raised some critical issues for cloud service provider. This rapid adaptation to the clouds, have increased concerns on a critical issue for successive growth of communication technology and information security. From a cloud security perspective, a number of unexplored risks and challenges are faced by cloud because of migration, causing degradation of the effectiveness of traditional protection mechanisms. Keywords: Cloud computing, Cloud DBaaS, public cloud, Cloud Security, Confidentiality, Trust, Encryption.
Similar to A study on security responsibilities and adoption in cloud (20)
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
Abstract
The effect of addition of mono fibers and hybrid fibers on the mechanical properties of concrete mixture is studied in the present
investigation. Steel fibers of 1% and polypropylene fibers 0.036% were added individually to the concrete mixture as mono fibers and
then they were added together to form a hybrid fiber reinforced concrete. Mechanical properties such as compressive, split tensile and
flexural strength were determined. The results show that hybrid fibers improve the compressive strength marginally as compared to
mono fibers. Whereas, hybridization improves split tensile strength and flexural strength noticeably.
Keywords:-Hybridization, mono fibers, steel fiber, polypropylene fiber, Improvement in mechanical properties.
Material management in construction – a case studyeSAT Journals
Abstract
The objective of the present study is to understand about all the problems occurring in the company because of improper application
of material management. In construction project operation, often there is a project cost variance in terms of the material, equipments,
manpower, subcontractor, overhead cost, and general condition. Material is the main component in construction projects. Therefore,
if the material management is not properly managed it will create a project cost variance. Project cost can be controlled by taking
corrective actions towards the cost variance. Therefore a methodology is used to diagnose and evaluate the procurement process
involved in material management and launch a continuous improvement was developed and applied. A thorough study was carried
out along with study of cases, surveys and interviews to professionals involved in this area. As a result, a methodology for diagnosis
and improvement was proposed and tested in selected projects. The results obtained show that the main problem of procurement is
related to schedule delays and lack of specified quality for the project. To prevent this situation it is often necessary to dedicate
important resources like money, personnel, time, etc. To monitor and control the process. A great potential for improvement was
detected if state of the art technologies such as, electronic mail, electronic data interchange (EDI), and analysis were applied to the
procurement process. These helped to eliminate the root causes for many types of problems that were detected.
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
Abstract
Drought management needs multidisciplinary action. Interdisciplinary efforts among the experts in various fields of the droughts
prone areas are helpful to achieve tangible and permanent solution for this recurring problem. The Gulbarga district having the total
area around 16, 240 sq.km, and accounts 8.45 per cent of the Karnataka state area. The district has been situated with latitude 17º 19'
60" North and longitude of 76 º 49' 60" east. The district is situated entirely on the Deccan plateau positioned at a height of 300 to
750 m above MSL. Sub-tropical, semi-arid type is one among the drought prone districts of Karnataka State. The drought
management is very important for a district like Gulbarga. In this paper various short term strategies are discussed to mitigate the
drought condition in the district.
Keywords: Drought, South-West monsoon, Semi-Arid, Rainfall, Strategies etc.
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
Abstract
Pavements are subjected to severe condition of stresses and weathering effects from the day they are constructed and opened to traffic
mainly due to its fatigue behavior and environmental effects. Therefore, pavement rehabilitation is one of the most important
components of entire road systems. This paper highlights the design of concrete pavement with added mono fibers like polypropylene,
steel and hybrid fibres for a widened portion of existing concrete pavement and various overlay alternatives for an existing
bituminous pavement in an urban road in Bangalore. Along with this, Life cycle cost analyses at these sections are done by Net
Present Value (NPV) method to identify the most feasible option. The results show that though the initial cost of construction of
concrete overlay is high, over a period of time it prove to be better than the bituminous overlay considering the whole life cycle cost.
The economic analysis also indicates that, out of the three fibre options, hybrid reinforced concrete would be economical without
compromising the performance of the pavement.
Keywords: - Fatigue, Life cycle cost analysis, Net Present Value method, Overlay, Rehabilitation
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
Abstract
The issue of growing demand on our nation’s roadways over that past couple of decades, decreasing budgetary funds, and the need to
provide a safe, efficient, and cost effective roadway system has led to a dramatic increase in the need to rehabilitate our existing
pavements and the issue of building sustainable road infrastructure in India. With these emergency of the mentioned needs and this
are today’s burning issue and has become the purpose of the study.
In the present study, the samples of existing bituminous layer materials were collected from NH-48(Devahalli to Hassan) site.The
mixtures were designed by Marshall Method as per Asphalt institute (MS-II) at 20% and 30% Reclaimed Asphalt Pavement (RAP).
RAP material was blended with virgin aggregate such that all specimens tested for the, Dense Bituminous Macadam-II (DBM-II)
gradation as per Ministry of Roads, Transport, and Highways (MoRT&H) and cost analysis were carried out to know the economics.
Laboratory results and analysis showed the use of recycled materials showed significant variability in Marshall Stability, and the
variability increased with the increase in RAP content. The saving can be realized from utilization of recycled materials as per the
methodology, the reduction in the total cost is 19%, 30%, comparing with the virgin mixes.
Keywords: Reclaimed Asphalt Pavement, Marshall Stability, MS-II, Dense Bituminous Macadam-II
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
Abstract
Soil stabilization has proven to be one of the oldest techniques to improve the soil properties. Literature review conducted revealed
that uses of natural inorganic stabilizers are found to be one of the best options for soil stabilization. In this regard an attempt has
been made to evaluate the influence of RBI-81 stabilizer on properties of black cotton soil through laboratory investigations. Black
cotton soil with varying percentages of RBI-81 viz., 0, 0.5, 1, 1.5, 2, and 2.5 percent were studied for moisture density relationships
and strength behaviour of soils. Also the effect of curing period was evaluated as literature review clearly emphasized the strength
gain of soils stabilized with RBI-81 over a period of time. The results obtained shows that the unconfined compressive strength of
specimens treated with RBI-81 increased approximately by 250% for a curing period of 28 days as compared to virgin soil. Further
the CBR value improved approximately by 400%. The studies indicated an increasing trend for soil strength behaviour with
increasing percentage of RBI-81 suggesting its potential applications in soil stabilization.
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
Abstract
Reinforced masonry was developed to exploit the strength potential of masonry and to solve its lack of tensile strength. Experimental
and analytical studies have been carried out to investigate the effect of reinforcement on the behavior of hollow concrete block
masonry prisms under compression and to predict ultimate failure compressive strength. In the numerical program, three dimensional
non-linear finite elements (FE) model based on the micro-modeling approach is developed for both unreinforced and reinforced
masonry prisms using ANSYS (14.5). The proposed FE model uses multi-linear stress-strain relationships to model the non-linear
behavior of hollow concrete block, mortar, and grout. Willam-Warnke’s five parameter failure theory has been adopted to model the
failure of masonry materials. The comparison of the numerical and experimental results indicates that the FE models can successfully
capture the highly nonlinear behavior of the physical specimens and accurately predict their strength and failure mechanisms.
Keywords: Structural masonry, Hollow concrete block prism, grout, Compression failure, Finite element method,
Numerical modeling.
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
Abstract
Increase in traffic along with heavier magnitude of wheel loads cause rapid deterioration in pavements. There is a need to improve
density, strength of soil subgrade and other pavement layers. In this study an attempt is made to improve the properties of locally
available loamy soil using twin approaches viz., i) increasing the compaction of soil and ii) treating the soil with chemical stabilizer.
Laboratory studies are carried out on both untreated and treated soil samples compacted by different compaction efforts. Studies
show that increase in compaction effort results in increase in density of soil. However in soil treated with chemical stabilizer, rate of
increase in density is not significant. The soil treated with chemical stabilizer exhibits improvement in both strength and performance
properties.
Keywords: compaction, density, subgradestabilization, resilient modulus
Geographical information system (gis) for water resources managementeSAT Journals
Abstract
Water resources projects are inherited with overlapping and at times conflicting objectives. These projects are often of varied sizes
ranging from major projects with command areas of millions of hectares to very small projects implemented at the local level. Thus,
in all these projects there is seldom proper coordination which is essential for ensuring collective sustainability.
Integrated watershed development and management is the accepted answer but in turn requires a comprehensive framework that can
enable planning process involving all the stakeholders at different levels and scales is compulsory. Such a unified hydrological
framework is essential to evaluate the cause and effect of all the proposed actions within the drainage basins.
The present paper describes a hydrological framework developed in the form of a Hydrologic Information System (HIS) which is
intended to meet the specific information needs of the various line departments of a typical State connected with water related aspects.
The HIS consist of a hydrologic information database coupled with tools for collating primary and secondary data and tools for
analyzing and visualizing the data and information. The HIS also incorporates hydrological model base for indirect assessment of
various entities of water balance in space and time. The framework would be maintained and updated to reflect fully the most
accurate ground truth data and the infrastructure requirements for planning and management.
Keywords: Hydrological Information System (HIS); WebGIS; Data Model; Web Mapping Services
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
Abstract
The study demonstrate the potentiality of satellite remote sensing technique for the generation of baseline information on forest types
including tree plantation details in Bidar forest division, Karnataka covering an area of 5814.60Sq.Kms. The Total Area of Bidar
forest division is 5814Sq.Kms analysis of the satellite data in the study area reveals that about 84% of the total area is Covered by
crop land, 1.778% of the area is covered by dry deciduous forest, 1.38 % of mixed plantation, which is very threatening to the
environmental stability of the forest, future plantation site has been mapped. With the use of latest Geo-informatics technology proper
and exact condition of the trees can be observed and necessary precautions can be taken for future plantation works in an appropriate
manner
Keywords:-RS, GIS, GPS, Forest Type, Tree Plantation
Factors influencing compressive strength of geopolymer concreteeSAT Journals
Abstract
To study effects of several factors on the properties of fly ash based geopolymer concrete on the compressive strength and also the
cost comparison with the normal concrete. The test variables were molarities of sodium hydroxide(NaOH) 8M,14M and 16M, ratio of
NaOH to sodium silicate (Na2SiO3) 1, 1.5, 2 and 2.5, alkaline liquid to fly ash ratio 0.35 and 0.40 and replacement of water in
Na2SiO3 solution by 10%, 20% and 30% were used in the present study. The test results indicated that the highest compressive
strength 54 MPa was observed for 16M of NaOH, ratio of NaOH to Na2SiO3 2.5 and alkaline liquid to fly ash ratio of 0.35. Lowest
compressive strength of 27 MPa was observed for 8M of NaOH, ratio of NaOH to Na2SiO3 is 1 and alkaline liquid to fly ash ratio of
0.40. Alkaline liquid to fly ash ratio of 0.35, water replacement of 10% and 30% for 8 and 16 molarity of NaOH and has resulted in
compressive strength of 36 MPa and 20 MPa respectively. Superplasticiser dosage of 2 % by weight of fly ash has given higher
strength in all cases.
Keywords: compressive strength, alkaline liquid, fly ash
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
Abstract
Composite Circular hollow Steel tubes with and without GFRP infill for three different grades of Light weight concrete are tested for
ultimate load capacity and axial shortening , under Cyclic loading. Steel tubes are compared for different lengths, cross sections and
thickness. Specimens were tested separately after adopting Taguchi’s L9 (Latin Squares) Orthogonal array in order to save the initial
experimental cost on number of specimens and experimental duration. Analysis was carried out using ANN (Artificial Neural
Network) technique with the assistance of Mini Tab- a statistical soft tool. Comparison for predicted, experimental & ANN output is
obtained from linear regression plots. From this research study, it can be concluded that *Cross sectional area of steel tube has most
significant effect on ultimate load carrying capacity, *as length of steel tube increased- load carrying capacity decreased & *ANN
modeling predicted acceptable results. Thus ANN tool can be utilized for predicting ultimate load carrying capacity for composite
columns.
Keywords: Light weight concrete, GFRP, Artificial Neural Network, Linear Regression, Back propagation, orthogonal
Array, Latin Squares
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
Abstract
This paper presents an outlook on experimental behavior and a comparison with predicted formula on the behaviour of circular
concentrically loaded self-consolidating fibre reinforced concrete filled steel tube columns (HSSCFRC). Forty-five specimens were
tested. The main parameters varied in the tests are: (1) percentage of fiber (2) tube diameter or width to wall thickness ratio (D/t
from 15 to 25) (3) L/d ratio from 2.97 to 7.04 the results from these predictions were compared with the experimental data. The
experimental results) were also validated in this study.
Keywords: Self-compacting concrete; Concrete-filled steel tube; axial load behavior; Ultimate capacity.
Evaluation of punching shear in flat slabseSAT Journals
Abstract
Flat-slab construction has been widely used in construction today because of many advantages that it offers. The basic philosophy in
the design of flat slab is to consider only gravity forces; this method ignores the effect of punching shear due to unbalanced moments
at the slab column junction which is critical. An attempt has been made to generate generalized design sheets which accounts both
punching shear due to gravity loads and unbalanced moments for cases (a) interior column; (b) edge column (bending perpendicular
to shorter edge); (c) edge column (bending parallel to shorter edge); (d) corner column. These design sheets are prepared as per
codal provisions of IS 456-2000. These design sheets will be helpful in calculating the shear reinforcement to be provided at the
critical section which is ignored in many design offices. Apart from its usefulness in evaluating punching shear and the necessary
shear reinforcement, the design sheets developed will enable the designer to fix the depth of flat slab during the initial phase of the
design.
Keywords: Flat slabs, punching shear, unbalanced moment.
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
Abstract
Intake towers are typically tall, hollow, reinforced concrete structures and form entrance to reservoir outlet works. A parametric
study on dynamic behavior of circular cylindrical towers can be carried out to study the effect of depth of submergence, wall thickness
and slenderness ratio, and also effect on tower considering dynamic analysis for time history function of different soil condition and
by Goyal and Chopra accounting interaction effects of added hydrodynamic mass of surrounding and inside water in intake tower of
dam
Key words: Hydrodynamic mass, Depth of submergence, Reservoir, Time history analysis,
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
Abstract
Efficiency of the road network system is analyzed by travel time reliability measures. The study overlooks on an important measure of
travel time reliability and prioritizing Tiruchirappalli road network. Traffic volume and travel time were collected using license plate
matching method. Travel time measures were estimated from average travel time and 95th travel time. Effect of non-motorized vehicle
on efficiency of road system was evaluated. Relation between buffer time index and traffic volume was created. Travel time model has
been developed and travel time measure was validated. Then service quality of road sections in network were graded based on
travel time reliability measures.
Keywords: Buffer Time Index (BTI); Average Travel Time (ATT); Travel Time Reliability (TTR); Buffer Time (BT).
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
Abstract
The development of watershed aims at productive utilization of all the available natural resources in the entire area extending from
ridge line to stream outlet. The per capita availability of land for cultivation has been decreasing over the years. Therefore, water and
the related land resources must be developed, utilized and managed in an integrated and comprehensive manner. Remote sensing and
GIS techniques are being increasingly used for planning, management and development of natural resources. The study area, Nallur
Amanikere watershed geographically lies between 110 38’ and 110 52’ N latitude and 760 30’ and 760 50’ E longitude with an area of
415.68 Sq. km. The thematic layers such as land use/land cover and soil maps were derived from remotely sensed data and overlayed
through ArcGIS software to assign the curve number on polygon wise. The daily rainfall data of six rain gauge stations in and around
the watershed (2001-2011) was used to estimate the daily runoff from the watershed using Soil Conservation Service - Curve Number
(SCS-CN) method. The runoff estimated from the SCS-CN model was then used to know the variation of runoff potential with different
land use/land cover and with different soil conditions.
Keywords: Watershed, Nallur watershed, Surface runoff, Rainfall-Runoff, SCS-CN, Remote Sensing, GIS.
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
Abstract
Land and water are the two vital natural resources, the optimal management of these resources with minimum adverse environmental
impact are essential not only for sustainable development but also for human survival. Satellite remote sensing with geographic
information system has a pragmatic approach to map and generate spatial input layers of predicting response behavior and yield of
watershed. Hence, in the present study an attempt has been made to understand the hydrological process of the catchment at the
watershed level by drawing the inferences from moprhometric analysis and runoff. The study area chosen for the present study is
Yagachi catchment situated in Chickamaglur and Hassan district lies geographically at a longitude 75⁰52’08.77”E and
13⁰10’50.77”N latitude. It covers an area of 559.493 Sq.km. Morphometric analysis is carried out to estimate morphometric
parameters at Micro-watershed to understand the hydrological response of the catchment at the Micro-watershed level. Daily runoff
is estimated using USDA SCS curve number model for a period of 10 years from 2001 to 2010. The rainfall runoff relationship of the
study shows there is a positive correlation.
Keywords: morphometric analysis, runoff, remote sensing and GIS, SCS - method
-
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
Abstract The nonlinear Static procedure also well known as pushover analysis is method where in monotonically increasing loads are applied to the structure till the structure is unable to resist any further load. It is a popular tool for seismic performance evaluation of existing and new structures. In literature lot of research has been carried out on conventional pushover analysis and after knowing deficiency efforts have been made to improve it. But actual test results to verify the analytically obtained pushover results are rarely available. It has been found that some amount of variation is always expected to exist in seismic demand prediction of pushover analysis. Initial study is carried out by considering user defined hinge properties and default hinge length. Attempt is being made to assess the variation of pushover analysis results by considering user defined hinge properties and various hinge length formulations available in literature and results compared with experimentally obtained results based on test carried out on a G+2 storied RCC framed structure. For the present study two geometric models viz bare frame and rigid frame model is considered and it is found that the results of pushover analysis are very sensitive to geometric model and hinge length adopted. Keywords: Pushover analysis, Base shear, Displacement, hinge length, moment curvature analysis
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
Abstract
Depletion of natural resources and aggregate quarries for the road construction is a serious problem to procure materials. Hence
recycling or reuse of material is beneficial. On emphasizing development in sustainable construction in the present era, recycling of
asphalt pavements is one of the effective and proven rehabilitation processes. For the laboratory investigations reclaimed asphalt
pavement (RAP) from NH-4 and crumb rubber modified binder (CRMB-55) was used. Foundry waste was used as a replacement to
conventional filler. Laboratory tests were conducted on asphalt concrete mixes with 30, 40, 50, and 60 percent replacement with RAP.
These test results were compared with conventional mixes and asphalt concrete mixes with complete binder extracted RAP
aggregates. Mix design was carried out by Marshall Method. The Marshall Tests indicated highest stability values for asphalt
concrete (AC) mixes with 60% RAP. The optimum binder content (OBC) decreased with increased in RAP in AC mixes. The Indirect
Tensile Strength (ITS) for AC mixes with RAP also was found to be higher when compared to conventional AC mixes at 300C.
Keywords: Reclaimed asphalt pavement, Foundry waste, Recycling, Marshall Stability, Indirect tensile strength.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
A study on security responsibilities and adoption in cloud
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 163
A STUDY ON SECURITY RESPONSIBILITIES AND ADOPTION IN
CLOUD
Dasprakash.G1
, Megha.J2
, K.Srinivas3
1, 2
M.Tech (Student), Computer Network and Engineering, Acharya Institute of Technology, Bangalore
3
Assistant Professor, Department of Information Science and Engineering, Acharya Institute of Technology, Bangalore
dasprakash.mtcn.12@acharya.ac.in, megha.mtcn.12@acharya.ac.in, srinivask@acharya.ac.in
Abstract
Cloud computing is one of the popular enterprise models where computing resources are made available on-demand to the user as
needed. Due to this increasing demand for more clouds there is an ever growing threat of security becoming a major issue. cloud
computing is a construct that allows you to access applications that actually reside at a location other than your computer or other
Internet-connected device, most often, this will be a distant data center. In a simple, topological sense, a cloud computing solution is
made up of several elements: clients, the datacenter, and distributed servers. Each element has a purpose and plays a specific role in
delivering a functional cloud based application, the increased degree of connectivity and the increasing amount of data has led many
providers and in particular data centers to employ larger infrastructures with dynamic load and access balancing. So this paper shall
look at ways in which security responsibilities and Cloud Adoption
Keywords: Cloud Computing, Service models, Cloud Security, Secure Cloud Adoption,
----------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
Cloud computing is a term that involves delivering a services
over the Internet. These services are broadly divided into three
categories: Infrastructure-as-a-Service (IaaS), Platform-as-a-
Service (PaaS) and Software-as-a-Service (SaaS) [1]. The
pioneer of Cloud Computing vendors, Amazon Simple
Storage Service (S3) and Amazon Elastic Compute Cloud
(EC2) are both well-known examples [2].
Fig 1: Cloud Computing Visual
2. SERVICE MODELS
The three most common service models for cloud computing
is as follows:
2.1 Infrastructure as a Service (IaaS)
The capability provided to the customer is to provision
processing, storage, networks, and other
fundamentalcomputing resources where the customer is able
to deploy and run arbitrary software, which can
includeoperating systems and applications. The customer does
not manage or control the underlying cloudinfrastructure but
has control over operating systems, storage, and deployed
applications [4].
2.2 Platform as a Service (PaaS)
The capability provided to the customer is to deploy onto the
cloud infrastructure customer-created oracquired applications
created using programming languages, libraries, services, and
tools supported bythe provider. The customer does not manage
or control the underlying cloud infrastructure
includingnetwork, servers,operating systems, or storage, but
has control over the deployed applications and possibly
configuration settings for the application-hosting environment.
2.3 Software as a Service (SaaS)
The capability provided to the customer is to use the
provider’s applications running on a cloud infrastructure. The
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 164
applications are accessible from various client devices through
either a thin client interface, such as aweb browser (e.g., web-
based email), or a program interface. The customer does not
manage or control theunderlying cloud infrastructure
including network, servers, operating systems, storage, or even
individualapplication capabilities, with the possible exception
of limited user specific application configuration settings.
3. DEPLOYMENT MODELS
How customers deploy the services from these providers also
varies and generally falls into one of thefollowing three
models [5].
3.1 Public
This type of cloud infrastructure is open to public or to a large
industry group. The organization offering this type of cloud
service generally owns, manages and operates on its own
premises.
3.2 Virtual Private or On-Site Virtualized
The cloud infrastructure is operated solely for a single
organization. It may be managed by the organization orby a
third party and may be located on-premise or off-premise.
3.3 Hybrid IT
The cloud infrastructure is a composition of two or more
clouds (private, community, or public) that remainunique
entities but are bound together by standardized or proprietary
technology that enables data and application portability
The following diagram from the PCI Security Standards
Council provides a good example of how control is assigned
between the customer and service provider in these different
models:
Fig 2: Customer and Service Provider Control
4. SECURITY RESPONSIBILITIES BY CLOUD
SERVICE MODEL
To address the security needs of workloads running in the
cloud, first organizations need to understand who is
responsible for protecting those workloads. The roles and
responsibilities transfer among the different cloud computing
service models.
Fig 3: Security Responsibilities view basedon SPI Model
The cloud provider in an IaaS model is typically responsible
for the security of the underlying infrastructure whereas in the
SaaS model the cloud provider is responsible for securing the
infrastructure and the application.
The providers’ responsibility to provide security controls
implementation increases as we move higher in the stack of a
SPI model (i.e. SaaS, PaaS, IaaS) while cloud customer
responsibility increases as we move lower in the stack of a SPI
model.
5. SHARED SECURITY RESPONSIBILITY WITH
CLOUD SERVICE PROVIDERS
While the specifics of the threats that face cloud computing
implementations are not new, the way that they are mitigated
and who is responsible, is different. For example, “inside
threats” in a traditional IT model still apply to the cloud-
computing model. But in a cloud service offering, the primary
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 165
controls, e.g. administrative and physical controls, which can
help mitigate this type of threat, are now provided by the
cloud service provider. When an organization chooses to
secure their data they implement one or more of the three
types of controls.
5.1 Administrative Controls
Administrative controls (also called procedural controls)
consist of approved written policies, procedures, standards and
guidelines. Administrative controls form the framework for
running the business and managing people. When workloads
are run in a traditional enterprise IT infrastructure, it is
considered a trusted environment because it is either
physically located within the organization’s on-premise
facilities and/or directly managed by the organization.
Completecontrol over the networking infrastructure is
exercised and includes physical access to the facility,
background checks to hire new employees and implementing
change management processes.
When migrating to the cloud, applications and data are now in
an environment that is not controlled directly by the
organization. In its place is a separately managed and
maintained infrastructure hosted externally with the cloud
provider. Now, instead of controlling the IT environment
directly through the implementation of various controls that
are defined by the organization, this is now achieved through
the relationship with the cloud service provider and their
associated service level agreements (SLA s).
5.2 Physical Controls
Physical controls monitor and control the environment of the
workplace and computing facilities. They also monitor and
control access to and from such facilities. Administrative and
technical controls ultimately depend on proper physical
security controls. An administrative policy allowing only
authorized employee access to the data center serves no
purpose if there is no physical access control stopping an
unauthorized employee access to the facility. In a traditional
IT model the organization is responsible for implementing
these physical controls to secure the computing facility, while
separating the network and workplace environments and
putting up environmental safeguards.
When moving to cloud services, physical controls
implementation is the responsibility of the cloud provider. It is
important to understanding the specific physical controls and
maps them to ensure that these meet the organization’s
requirements.
5.3 Logical Controls
Logical controls (also called technical controls) use software
and data to monitor and control access to information and
computing systems. For example: passwords, network and
host-based firewalls, intrusion prevention systems, access
control lists, and data encryption are logical controls.
Control over the implementation of the logical controls varies
depending upon the cloud service model. In the IaaS cloud
service model, you have complete control of the logical
control implementations that are associated with the systems.
When choosing logical controls to protect instances, consider
answering questions such as:
• Is the selected control scale based on the demand?
• Is it “cloud aware” and is it integrated with provider API’s to
provide an instant view when the instances scale up and
down?
• Can it be extended from existing IT infrastructure to the
cloud infrastructure to help enforceconsistent security policy
and provide a single policy management interface?
• Does it have the capability to automatically detect new
resources and install neededaccesscontrols?
• Can security policies be enforced as soon as the instance is
brought online to reduce the window of exposure?
6. CLOUD SECURITY AND IAAS –A SHARED
RESPONSIBILITY
Fig 4: Shared Responsibilities Model
So for organizations leveraging cloud providers, security
becomes a shared responsibility [6]. The model below lays out
in more detail the various areas that organizations leveraging
an IaaS are responsible for along with the associated security
controls and security practices.
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 166
AWS provides security up to the hypervisor, meaning they
will address security controls such as physical security,
environmental security, and virtualization security The cloud
customer is responsible for security controls that relate to the
IT system (i.e. instance), including the guest operating system,
middleware technologies and applications.
7. STEPS FOR SECURE CLOUD ADOPTION
7.1 Step 1 - Put Away Your AWS “root” Account and
Use IAM to Enable Access
An AWS account is the first entity that is created when
initiating a relationship with AWS. This account isconsidered
a “root” accounts and provides access to all AWS resources
including billing information. It isrecommended to not use this
account and instead leverage the AWS IAM service to create
users, groups androles to interact with AWS
To manage AWS accounts easily and with added security, it is
recommended that customers create usersand groups and then
assign permissions specific to their functional requirements.
Assigning permissionsto allow users access to AWS is no
different than the approach used in the traditional IT model i.e.
assigning permissions at the group level. It is more convenient
to manage permissions at the group level then individualusers.
Groups can be created according to job functions (e.g.
administrators, managers, testers etc.), andrelevant
permissions for each group can be established and then IAM
users can be assigned to those groups. When creating security
policies (set of permissions) to control access to AWS
resources, use the “leastprivilege” model. Following this
model will require some research by the customer to correctly
determine theright set of permissions that allow users to
perform their job duties. Users can also leverage AWS IAM
groupsto enforce the “separation of duties” security practice.
Amazonprovides default built-in policy templates,
whichinclude predefined permissions. These templates can be
used for common use cases such as AdministrativeAccess and
Read-only Access.
7.2 Step 2 - Enforce Strong Password Policy
The need for a strong password policy seems obvious but it is
extremely important to prevent passwords frombeing guessed
or cracked. The role that passwords play in securing customer
systems is often underestimatedand overlooked. Passwords
provide the first line of defense against unauthorized system
access. Amazonallows the customer to define and enforce
password policies such as a passwords minimum length and
whetherit requires a non-alphabetic character. It is
recommended that customers define and enforce strong
passwordpolicy, which requires users to update their
credentials at a regular interval of time e.g. 90 days.
7.3 Step 3 - Enable Multi-Factor Authentication for
Privilege Users
When enforcing a strong password policy for authentication
and using AWS IAM service to define authorizationlevels,
consider enabling multi-factor authentication (MFA) for
privilege and administrative users. AWS MFA isan additional
layer of security that offers enhanced control over AWS
account settings and the management oftoday, many
organizations requires additional security controls when an
administrative user has even greateraccess to the system. It is
recommended that AWS resources be protected by
configuring AWS MFA for allprivilege users. A privilege user
could be a user who has access to instances with permissions
that can disruptbusiness operations. For example, a privilege
user is a user with access to AWS resources and permissions
to terminate production instances.
By enabling MFA, extra security is added by requiring all
such users to enter a unique authentication codefrom their
authentication device when accessing AWS websites or
services. This will prevent anyone withunauthorized
knowledge of email addresses and passwords from
impersonating system controls.Amazon provides two choices
to enable MFA; either use of hardware base token devices
from third-partyvendors or software base tokens running an
AWS MFA compatible application virtual token service on
asmart phone, tablet, or computer.
7.4 Step 4 - Build a Secure Base Amazon Machine
Image (AMI)
When using a pre-configured operating system template aka
Amazon Machine Image (AMI ) or a customizedconfiguration
AMI to create a virtual machine within the Amazon Elastic
Compute Cloud (EC 2), the customeris responsible for
performing the appropriate due diligence before using the
instance to host applications. Thecustomer has full root access
or administrative control over this virtual system. AWS does
not have any accessrights to customer instances and cannot log
into the guest OS hence cannot vouch for the integrity or
securityof that instance. It is recommended that customers go
through an exercise of operating system hardening toensure
only required applications and services are enabled. It will
help reduce the attack surface if running software services are
streamlined, and instances are configureddown to the bare
minimum, for example, disabling password-only access to
hosts, utilizing some form of multifactor authentication to
allow access to critical instances and disabling remote “root”
account logins.
7.5 Step 5 - Protect the Guest Operating System
Amazon has a very robust process for implementing and
managing the administrative and physical controltypes as well
5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 167
as securing the virtualization or hypervisor layer (Host OS),
but it is the customer’s responsibilityto continuously maintain
and equip their AWS instances with defensive security
controls and regularly assesstheir effectiveness. Amazon EC 2
provides tools such as AWS Security Groups for securing
cloud-based servers. It is recommendedthat customers take
advantage of these basic tools to implement basic security and
then implement additionalsecurity by leveraging technology
solutions such as; anti-virus, host-based firewalls, host-based
intrusionprevention, file integrity monitoring, log inspection,
encryption and key management solutions.
Protecting the guest operating system also means applying
regular security updates and OS patches. Forexample,
updating security patches for an instance hosting “always-up”
web applications may be extremelydifficult and costly. To
ease patch management difficulties it is recommended that
customers use vulnerabilityshielding, aka “virtual patching”
solutions. This will ensure that application availability goals
are met without compromising security.
7.6 Step 6 - Create Restrictive Firewall Policy and
Use HOST -BASED Firewalls
Amazon provides tools such as AWS (EC 2) firewall for
securing cloud-based servers. Every Amazon EC 2 instance is
protected by either one or more security groups which contain
sets of firewall rules that specifywhich type of network traffic
should be delivered to that particular instance. By default, the
firewall operates ina deny-all mode and customers must
explicitly open the ports needed to allow inbound traffic.
Often enough the firewall policy contains an overly
permissive set of rules which create security holes. It is
recommended that customers lockdown their firewall policy
and only allow communication that is absolutely required.
Creating a restrictive traffic management and security design
on a per-instance basis is their job. For example, customers
should not open remote access (RD P or SSH ) to all of their
production instances insteadthey should use “Bastion Hosts”
to get remote access to production instances and lock down
administrative access to only the “Bastion Host” from the
external network.The AWS EC 2 security groups give
customers basic firewall with semi-state full protection
capabilities to control only incoming communications (except
when using AWSVPC services). It does not prevent a server
from initiating outbound communications and it does not have
any logging optionsavailable for any rules that are
configuredwhich could be important in some casese.g.
troubleshooting and monitoring. It’s recommended that
customers take advantage of these security groups to restrict
ingress (incoming) communications and then implement
additional security by leveraging technology such as host-
based firewalls to strengthen network-based security in
Amazon EC 2. Customers should choose a host-based Bi-
directional state full firewall with logging and alerting
capabilities. This will help them create a “defense in depth”
security posture.
7.7 Step 7 - Secure Your Applications and Use HOST
-BASED Intrusion Prevention System
Creating a restrictive firewall policy and augmenting AWS EC
2 firewall with a host-based firewall is not enough. The
traditional firewalls are designed to reduce the attack surface
but they still have to allow traffic on open ports. For example,
if the customer is running a web based application and their
firewall policy allows traffic onport 80/443 of the application
then the firewall will allow all such traffic. It lacks the
intelligence to determine ifthe allowed traffic is legitimate
traffic. Securing an application involves many important
elements ranging fromsecure coding practices to penetration
testing; it could simply mean following a practice which
allows access toencrypted sensitive information only “on-
demand” and not caching it into memory.
Today, customer demand requires that businesses run short
development cycles with increased functionalityand rich
feature sets. This can result in the release of applications that
aren’t properly secured which in turn could potentially harm a
customer’s business reputation. If an organization has
developed a web applicationthat is accessible externally over
the Internet, one that interacts with in-house or third party
technologies, theninevitably it is susceptible to security holes.
The most common web application vulnerabilities that an
application could potentially be facing are SQLinjection and
Cross Site Scripting (XSS) attacks. To protect an application
from these attacks customers shouldconsider using web
application protection technologies such as host base intrusion
preventions system (HI PS).
7.8 Step 8 - File Integrity Monitoring & Logging
The next step is to ensure the continuous integrity of critical
system files, application configuration files, andapplication
logs. File integrity monitoring is emerging as a critical aspect
of information security. It providesan early indication of a
compromised system and it is required by various compliance
standards such as PCI. It is recommended that customers
implement file integrity monitoring and log analysis solutions
to detect anyunauthorized modifications to their system
components – files, registry, services, processes and critical
systemfiles. Logging is another important component of
information security. If logs are not taken, security incidents
cannot be captured and if log and security events are not
monitored, incidents cannot be detected. It isimportant to
enable logging for all components that provide visibility into
computing environments including; operating system, firewall,
antivirus software, intrusion prevention, and application logs.
There are many solutions available to customers from host-
based solutions to a MSS P. If a customer hasalready
6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 168
established a monitoring solution and is collecting logs to a
central server, then instances running inthe cloud are just
another resource that must be monitored. Firewall
configurations changes may be requiredto allow logs from the
cloud environment to reach the central log-collection server
on-premises in addition tosecuring the data transmission path.
7.9 Step 9 - Encrypt Sensitive Data
It is important that customers do their due-diligence and
evaluate the nature, sensitivity and classification ofmoving
data and accept the potential consequences of putting the
sensitive data in the public cloud. Sensitivedata could be user
identity and credentials as well as any personally identifiable
information (PII) such as socialsecurity number. When data is
moved to public cloud it may become subject to the
regulations of an unknown jurisdiction so it’s important that
customers instruct their cloud provider to store their data in a
specific region. For example, if a European company is storing
the data in a US region, it becomes subject to the USA Patriot
Act, which allows the US government to access data stored
within US borders. Amazon does allow its customers to
specify theirgeographical region preferences when using AWS
services. Customers must ensure they inform Amazon oftheir
preferred region for data storage, appropriate for their
business.
When choosing an encryption solution to protect sensitive data
“at-rest” whether a open source solution orbuilt-in OS
solution, (e.g. Microsoft Encrypting File System (EFS),
encrypts or a commercial solution), customersmust evaluate
each solution and see what fits best with their security
practice. Is encrypting individual filesenough to meet security
requirements or is encryption of the entire volume required?
Another importantfactor when selecting a solution is the key
management and custodianship of these keys. Does the
securitypractice require that the encryption keys not leave the
premises? If the answer is yes, then OS built-in
solutionscannot be used since they all require that encryption
keys be stored on the system.
7.10 Step 10 - Conduct Vulnerability Assessment
The main objective of the vulnerability assessment (VA) is to
find as much vulnerability as possible thatan attacker can use
to cause damage to an organization. This vulnerability
assessment can be run againstcustomer networks, systems or
the web applications. There are many tools, services or a
combination of bothavailable that can be used to conduct
vulnerability assessments. It is recommended that a trained
securityassessor, either internal or from an external company,
perform this assessment even if customers are using atool to
perform this exercise. A trained security assessor may find
more security flaws and help customer’sfine-tunetheir existing
security controls or add more controls.
7.11 Step 11 - Perform Penetration Testing
Once customers have created their desired security posture
around their running instances, it is recommendedthat they
evaluate the security of their systems by conducting
penetration testing to safely exploit systemvulnerabilities,
including OS service and application weaknesses. By
conducting the vulnerability assessment, customers have
identified the vulnerabilities but not the potentialconsequences
if the vulnerabilities are exploited. For example, the
vulnerability scan may show SQL injection vulnerability, but
when they attempt to exploit it in the penetration testing, it
could reveal personallyidentifiable information (PII) or data
that is with-in the risk tolerance of the organization.
Penetration testing is very useful approach to validating the
effectiveness of the defensive mechanisms. This exercise will
help customers determine if their security controls
implementation can withstand realworld attacks. Amazon
understands the critical importance of penetration testing in
any secure application deployment; hence it has established a
policy for its customers to request permission to conduct
penetrationtests. The PCI Data Security Standard, FISMA,
NIST, and other legislative and industry regulations also
mandate
7.12 Step 12 - Stay Involved and Maintain Security
In a traditional IT computing model, security is not a one-time
exercise. The same rule applies in thecloud-computing model.
Customers need to stay involved and maintain their security
practice. Customerresponsibility doesn’t end after selecting
AWS as a vendor of choice, creating their security framework
andmoving workloads to the cloud. Most likely customers will
continue to migrate new workloads to the cloudor acquire new
services to meet business needs. As customer requirements
change, they must evaluate thechanges from a security
perspective and deploy updated or new controls to provide
protection. Customersneed to ensure the ongoing management
aspect of security continues which may involve documenting
implemented controls and monitoring changes.
CONCLUSIONS
Cloud provides attractive options to improve business and it is
flexibility. But taking advantage of thesebenefits means
continuing to be responsible for numerous aspects of security.
While these concerns shouldnot discourage adopting cloud
computing, it is necessary to understand responsibilities in this
shared securitymodel and adapt security practices to this new
environment.
7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 169
REFERENCES
[1]. Danish Jamil, Cloud Computing Security, Department Of
Computer Engineering, Sir Syed University Of Engineering
&Technology,Main University Road, Karachi, Sindh-
75300,Pakistan
[2]. Ren K Et Al. 2009. Ensuring Data Storage Security In
Cloud Computing. [Online]Available
From:Www.Ece.Iit.Edu/~Ubisec/Iwqos09.Pdf
[3]. "Service Level Agreement Definition And Contents",
Http://Www.Service-Level-Agreement.Net, Accessed On
March 10, 2009.
[4]. Wesamdawoud, Ibrahim Takouna and Christophmeinel,
"Infrastructure As A Service Security: Challenges And
Solutions," In 2010 The 7th International Conference On
Informatics And Systems, 2010
[5]. Cloud Computing - A Practical Approach by Velte, Tata
Mcgraw-Hill Edition (Isbn-13:978-0-07-068351-8)
[6]. "Secure Group Addresses Cloud Computing Risks",
Http://Www.Secpoint.Com/Security-Group-Addresses-Cloud-
Computing-Risks.Html, April 25, 2009.