The Advent of the digital age has led to a rise in different types of data with every passing day. In fact, it is expected that half of the total data used around the world will be on the cloud nowadays. This complex data needs to be stored, processed and analyzed for information gaining that can be used for several organizations. Cloud computing provides an appropriate platform for Software Defined Networking (SDN) in communicating and computing requirements of the latter. It makes cloud-based networking a viable research field in the current scenario. However, several issues addressed and risk needs to be mitigated in the L2 cloud server. Virtual networks and cloud federation being considered in the network virtualization over L3 cloud router. This research work explores the existing research challenges and discusses open issues for the security in cloud computing and its uses in the relevant field by means of a comparative analysis of L2 server L3 router based on SDN tools. Also, an analysis of such issues are discussed and summarized. Finally, the best tool identified for the use cloud security.
This document discusses various computing paradigms such as fog computing, cloud computing, edge computing, mobile cloud computing, and fog-based computing. It provides an overview of fog computing, describing its layered architecture and comparing it to similar paradigms like cloud and edge computing. Some key points discussed include:
- Fog computing enhances cloud computing by extending services and resources to the network edge, supporting low-latency applications.
- It has a 3-layer architecture with end devices, fog nodes, and cloud layers, placing resources closer to end users than the cloud.
- Characteristics of fog computing include low latency, mobility support, location awareness, and decentralized storage and analytics.
- Challen
This document provides a survey of mobile cloud computing. It discusses the definitions and models of cloud computing including infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). Mobile cloud computing is defined as using cloud infrastructure for data storage and processing instead of on the mobile device. The document reviews several research papers on mobile cloud computing and discusses challenges like network latency, limited bandwidth, security, and privacy. It proposes architectures and techniques to address these challenges and better utilize mobile cloud computing.
This document discusses the core concepts of cloud computing. It begins by explaining how cloud computing evolved from earlier technologies like mainframe computing, client-server systems, virtualization, distributed computing, and internet technologies. It then defines the key aspects of cloud computing models, including service models (IaaS, PaaS, SaaS) and deployment models (private, public, hybrid cloud). The document also outlines some of the core desired features of cloud computing like self-service, elasticity, metering and billing, and customization. Finally, it discusses some challenges and risks of cloud computing including security, privacy, trust issues as well as dependency on the cloud infrastructure.
Emerging cloud computing paradigm vision, research challenges and development...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document compares and contrasts cloud computing and grid computing. Grid computing refers to cooperation between multiple computers and servers to boost computational power, with a focus on high-capacity CPU tasks. Cloud computing delivers on-demand access to shared computing resources like networks, servers, storage and applications via the internet. Key differences include grid computing having a lower level of abstraction and scalability compared to cloud computing. Cloud computing also has stronger fault tolerance, is more widely accessible via the internet, and offers real-time services through its utility-based pricing model.
A Virtualization Model for Cloud ComputingSouvik Pal
Cloud Computing is now a very emerging field in the IT industry as well as research field. The advancement of Cloud Computing came up due to fast-growing usage of internet among the people. Cloud Computing is basically on-demand network access to a collection of physical resources which can be provisioned according to the need of cloud user under the supervision of Cloud Service provider interaction. From business prospective, the viable achievements of Cloud Computing and recent developments in Grid computing have brought the platform that has introduced virtualization technology into the era of high performance computing. Virtualization technology is widely applied to modern data center for cloud computing. Virtualization is used computer resources to imitate other computer resources or whole computers. This paper provides a Virtualization model for cloud computing that may lead to faster access and better performance. This model may help to combine self-service capabilities and ready-to-use facilities for computing resources.
Load Balancing In Cloud Computing:A ReviewIOSR Journals
Abstract: As the IT industry is growing day by day, the need of computing and storage is increasing
rapidly. The amount of data exchanged over the network is constantly increasing. Thus the process of this
increasing mass of data requires more computer equipment to meet the various needs of the organizations.
To better capitalize their investment, the over-equipped organizations open their infrastructures to others by
exploiting the Internet and other important technologies such as virtualization by creating a new computing
model: the cloud computing. Cloud computing is one of the significant milestones in recent times in the
history of computers. The basic concept of cloud computing is to provide a platform for sharing of resources
which includes software and infrastructure with the help of virtualization. This paper presents a brief review
of cloud computing. The main emphasize of this paper is on the load balancing technique in cloud
computing.
Keywords: Cloud Computing, Load Balancing, Dynamic Load Balancing, Virtualization, Data Center.
Efficient and reliable hybrid cloud architecture for big databaseijccsa
The objective of our paper is to propose a Cloud computing framework which is feasible and necessary for
handling huge data. In our prototype system we considered national ID database structure of Bangladesh
which is prepared by election commission of Bangladesh. Using this database we propose an interactive
graphical user interface for Bangladeshi People Search (BDPS) that use a hybrid structure of cloud
computing handled by apache Hadoop where database is implemented by HiveQL. The infrastructure
divides into two parts: locally hosted cloud which is based on “Eucalyptus” and the remote cloud which is
implemented on well-known Amazon Web Service (AWS). Some common problems of Bangladesh aspect
which includes data traffic congestion, server time out and server down issue is also discussed.
This document discusses various computing paradigms such as fog computing, cloud computing, edge computing, mobile cloud computing, and fog-based computing. It provides an overview of fog computing, describing its layered architecture and comparing it to similar paradigms like cloud and edge computing. Some key points discussed include:
- Fog computing enhances cloud computing by extending services and resources to the network edge, supporting low-latency applications.
- It has a 3-layer architecture with end devices, fog nodes, and cloud layers, placing resources closer to end users than the cloud.
- Characteristics of fog computing include low latency, mobility support, location awareness, and decentralized storage and analytics.
- Challen
This document provides a survey of mobile cloud computing. It discusses the definitions and models of cloud computing including infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). Mobile cloud computing is defined as using cloud infrastructure for data storage and processing instead of on the mobile device. The document reviews several research papers on mobile cloud computing and discusses challenges like network latency, limited bandwidth, security, and privacy. It proposes architectures and techniques to address these challenges and better utilize mobile cloud computing.
This document discusses the core concepts of cloud computing. It begins by explaining how cloud computing evolved from earlier technologies like mainframe computing, client-server systems, virtualization, distributed computing, and internet technologies. It then defines the key aspects of cloud computing models, including service models (IaaS, PaaS, SaaS) and deployment models (private, public, hybrid cloud). The document also outlines some of the core desired features of cloud computing like self-service, elasticity, metering and billing, and customization. Finally, it discusses some challenges and risks of cloud computing including security, privacy, trust issues as well as dependency on the cloud infrastructure.
Emerging cloud computing paradigm vision, research challenges and development...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document compares and contrasts cloud computing and grid computing. Grid computing refers to cooperation between multiple computers and servers to boost computational power, with a focus on high-capacity CPU tasks. Cloud computing delivers on-demand access to shared computing resources like networks, servers, storage and applications via the internet. Key differences include grid computing having a lower level of abstraction and scalability compared to cloud computing. Cloud computing also has stronger fault tolerance, is more widely accessible via the internet, and offers real-time services through its utility-based pricing model.
A Virtualization Model for Cloud ComputingSouvik Pal
Cloud Computing is now a very emerging field in the IT industry as well as research field. The advancement of Cloud Computing came up due to fast-growing usage of internet among the people. Cloud Computing is basically on-demand network access to a collection of physical resources which can be provisioned according to the need of cloud user under the supervision of Cloud Service provider interaction. From business prospective, the viable achievements of Cloud Computing and recent developments in Grid computing have brought the platform that has introduced virtualization technology into the era of high performance computing. Virtualization technology is widely applied to modern data center for cloud computing. Virtualization is used computer resources to imitate other computer resources or whole computers. This paper provides a Virtualization model for cloud computing that may lead to faster access and better performance. This model may help to combine self-service capabilities and ready-to-use facilities for computing resources.
Load Balancing In Cloud Computing:A ReviewIOSR Journals
Abstract: As the IT industry is growing day by day, the need of computing and storage is increasing
rapidly. The amount of data exchanged over the network is constantly increasing. Thus the process of this
increasing mass of data requires more computer equipment to meet the various needs of the organizations.
To better capitalize their investment, the over-equipped organizations open their infrastructures to others by
exploiting the Internet and other important technologies such as virtualization by creating a new computing
model: the cloud computing. Cloud computing is one of the significant milestones in recent times in the
history of computers. The basic concept of cloud computing is to provide a platform for sharing of resources
which includes software and infrastructure with the help of virtualization. This paper presents a brief review
of cloud computing. The main emphasize of this paper is on the load balancing technique in cloud
computing.
Keywords: Cloud Computing, Load Balancing, Dynamic Load Balancing, Virtualization, Data Center.
Efficient and reliable hybrid cloud architecture for big databaseijccsa
The objective of our paper is to propose a Cloud computing framework which is feasible and necessary for
handling huge data. In our prototype system we considered national ID database structure of Bangladesh
which is prepared by election commission of Bangladesh. Using this database we propose an interactive
graphical user interface for Bangladeshi People Search (BDPS) that use a hybrid structure of cloud
computing handled by apache Hadoop where database is implemented by HiveQL. The infrastructure
divides into two parts: locally hosted cloud which is based on “Eucalyptus” and the remote cloud which is
implemented on well-known Amazon Web Service (AWS). Some common problems of Bangladesh aspect
which includes data traffic congestion, server time out and server down issue is also discussed.
Task Scheduling methodology in cloud computing Qutub-ud- Din
This document outlines a proposed methodology for developing efficient task scheduling strategies in cloud computing. It begins with introductions to cloud computing and task scheduling. It then reviews several relevant existing task scheduling algorithms from literature that focus on objectives like reducing costs, minimizing completion time, and maximizing resource utilization. The problem statement indicates the goals are to reduce costs, minimize completion time, and maximize resource allocation. An overview of the proposed methodology's flow is then provided, followed by references.
This document discusses security and privacy issues of fog computing based on a survey of existing work. It begins with an overview of fog computing, defining it as an extension of cloud computing to the edge of networks. It then identifies several key security and privacy challenges of fog computing, including issues of trust and authentication, network security, secure data storage, and secure and private data computation. Several potential solutions are also briefly discussed, such as reputation-based trust models, biometric authentication, software-defined networking for security, and techniques like homomorphic encryption to enable verifiable and private computation on outsourced data.
The document proposes an Inter-Cloud Architecture (ICA) to address integration and interoperability issues in heterogeneous multi-domain cloud environments. The key components of the ICA include: (1) a multi-layer Cloud Services Model for vertical integration of cloud services, (2) an Inter-Cloud Control and Management Plane for application/infrastructure control across clouds, and (3) an Inter-Cloud Federation Framework to federate independently managed cloud infrastructure from different providers. The ICA aims to facilitate on-demand provisioning of complex cloud infrastructure involving multiple providers and integration with legacy services.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Efficient architectural framework of cloud computing Souvik Pal
This document discusses an efficient architectural framework for cloud computing. It begins by providing background on cloud computing and discusses challenges such as security, privacy, and reliability. It then proposes a new architectural framework that separates infrastructure as a service (IaaS) into three sub-modules: IaaS itself, a hypervisor monitoring environment (HME), and resources as a service (RaaS). The HME acts as middleware between IaaS and physical resources, using a hypervisor to allocate resources from a pool managed by RaaS. This proposed framework is intended to improve performance and access speed for cloud computing.
A survey of models for computer networks managementIJCNCJournal
The virtualization concept along with its underlyin
g technologies has been warmly adopted in many fiel
ds
of computer science. In this direction, network vir
tualization research has presented considerable res
ults.
In a parallel development, the convergence of two d
istinct worlds, communications and computing, has
increased the use of computing server resources (vi
rtual machines and hypervisors acting as active
network elements) in network implementations. As a
result, the level of detail and complexity in such
architectures has increased and new challenges need
to be taken into account for effective network
management. Information and data models facilitate
infrastructure representation and management and
have been used extensively in that direction. In th
is paper we survey available modelling approaches a
nd
discuss how these can be used in the virtual machin
e (host) based computer network landscape; we prese
nt
a qualitative analysis of the current state-of-the-
art and offer a set of recommendations on adopting
any
particular method.
Cloud middleware and services-a systematic mapping reviewjournalBEEI
Cloud computing currently plays a crucial role in the delivery of vital information technology services. A unique aspect of cloud computing is the cloud middleware and other related entities that support applications and networks. A specific field of research may be considered, particularly as regards cloud middleware and services at all levels, and thus needs analysis and paper surveys to elucidate possible study limitations. The purpose of this paper is to perform a systematic mapping for studies that capture cloud computing middleware, stacks, tools and services. The methodology adopted for this study is a systematic mapping review. The results showed that more papers on the contribution facet were published with tool, model, method and process having 18.10%, 13.79%, 6.03% and 8.62% respectively. In addition, in terms of tool, evaluation and solution research had the largest number of articles with 14.17% and 26.77% respectively. A striking feature of the systemic map is the high number of articles in solution research with respect to all aspects of the features applied in the studies. This study showed clearly that there are gaps in cloud computing middleware and delivery services that would interest researchers and industry professionals desirous of research in this area.
Cloud computing security through symmetric cipher modelijcsit
Cloud computing can be defined as an application and services which runs on distributed network using
virtualized and it is accessed through internet protocols and networking. Cloud computing resources and
virtual and limitless and information’s of the physical systems on which software running are abstracted
from the user. Cloud Computing is a style of computing in which dynamically scalable and often virtualized
resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or
control over the technology infrastructure in the "cloud" that supports them. To satisfy the needs of the
users the concept is to incorporate technologies which have the common theme of reliance on the internet
Software and data are stored on the servers whereas cloud computing services are provided through
applications online which can be accessed from web browsers. Lack of security and access control is the
major drawback in the cloud computing as the users deal with sensitive data to public clouds .Multiple
virtual machine in cloud can access insecure information flows as service provider; therefore to implement
the cloud it is necessary to build security. Therefore the main aim of this paper is to provide cloud
computing security through symmetric cipher model. This article proposes symmetric cipher model in
order to implement cloud computing security so that data can accessed and stored securely.
This document discusses security issues in cloud computing. It begins by defining cloud computing and describing its service models and deployment models. It then identifies several key security issues in cloud computing, including security, privacy, reliability, lack of open standards, compliance, and concerns about long-term viability of data. Security is identified as the top challenge according to a survey of IT executives. The document argues that more must be done to address security, privacy, and other issues in order to fully realize the potential of cloud computing.
This document summarizes a research paper on the adoption of cloud computing in Nepal. The study found that both government and business organizations in Nepal have similar low levels of cloud computing adoption. Major barriers to adoption identified were security concerns, lack of connectivity, availability issues, vendor location restrictions, and legal uncertainties. The paper reviews the history and definitions of cloud computing. It also profiles existing cloud service providers in Nepal and the types of cloud services they offer. The research methodology used surveys and interviews to assess the current status of cloud adoption among organizations in Nepal.
A Threshold Secure Data Sharing Scheme for Federated CloudsIJORCS
The document proposes a secure data sharing scheme for federated clouds. The scheme uses a Trusted Cloud Authority (TCA) that controls participating clouds and generates private and public keys. Each cloud encrypts a secret value using its private key without knowing other clouds' values. They run a secure multi-party computation to calculate an encrypted sum polynomial. The TCA can later recover the original secret value from the sum polynomial without learning individual secret values. The scheme aims to ensure privacy and integrity of secret data shared between clouds during distributed computations.
This document provides a comprehensive study of cloud computing. It discusses cloud computing models including infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). It explores the benefits of cloud computing such as scalability, flexibility, and reduced costs. However, it also notes avoidance issues like security, privacy, internet dependency, and availability. The document concludes by stating that vertical scalability presents a technical challenge in cloud environments.
Cloud computing is Internet based development and use of computer technology. It is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or control over the technology infrastructure "in the cloud" that supports them. Cloud computing is a hot topic all over the world nowadays, through which customers can access information and computer power via a web browser. As the adoption and deployment of cloud computing increase, it is critical to evaluate the performance of cloud environments. Currently, modeling and simulation technology has become a useful and powerful tool in cloud computing research community to deal with these issues. Cloud simulators are required for cloud system testing to decrease the complexity and separate quality concerns. Cloud computing means saving and accessing the data over the internet instead of local storage. In this paper, we have provided a short review on the types, models and architecture of the cloud environment.
This document provides a review and comparison of cloud and grid computing. It begins with definitions of cloud computing and discusses the key characteristics of clouds such as scalability, on-demand access to resources, and utility-based pricing. It then describes the various cloud deployment models including public, private, hybrid and community clouds. The document outlines the architecture of cloud computing including virtual machines, physical machines, and a high-level market-oriented model. It provides Amazon's GrepTheWeb application as an example of a cloud-based architecture and discusses its scalability and cost advantages. In the conclusion, the document compares clouds to grids and their similarities and differences.
An Overview on Security Issues in Cloud ComputingIOSR Journals
This document discusses security issues in cloud computing. It begins by defining cloud computing and its service models, including software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS). It then discusses that security is the top challenge for cloud computing according to a survey of IT executives. Specifically, there are concerns about maintaining security, compliance, and control over critical applications and sensitive data when using public cloud environments. The document goes on to provide more details on cloud computing definitions, characteristics, architectures, and the specific security issues involved in cloud computing.
A Comparative Study: Taxonomy of High Performance Computing (HPC) IJECEIAES
The computer technologies have rapidly developed in both software and hardware field. The complexity of software is increasing as per the market demand because the manual systems are going to become automation as well as the cost of hardware is decreasing. High Performance Computing (HPC) is very demanding technology and an attractive area of computing due to huge data processing in many applications of computing. The paper focus upon different applications of HPC and the types of HPC such as Cluster Computing, Grid Computing and Cloud Computing. It also studies, different classifications and applications of above types of HPC. All these types of HPC are demanding area of computer science. This paper also done comparative study of grid, cloud and cluster computing based on benefits, drawbacks, key areas of research, characterstics, issues and challenges.
Review of Business Information Systems – Fourth Quarter 2013 V.docxmichael591
This document discusses security threats in cloud computing based on a case study interview with an IT manager. The interviewee's company uses both private and public clouds. The document identifies 41 security threats from literature and classifies them from technical and business perspectives. Based on the interview, the major drivers for using cloud computing were improving business continuity, reducing costs through virtualization and disaster recovery, and utilizing high bandwidth. The interview helped explore the dimensions of security threats in cloud computing beyond what is described in existing research.
A premeditated cdm algorithm in cloud computing environment for fpm 2IAEME Publication
This document discusses applying data mining techniques in a cloud computing environment. It begins with an introduction to cloud computing, describing its key characteristics including on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. The document then provides an overview of common data mining techniques like association, classification, clustering, prediction, and sequential patterns. It reviews recent studies applying these techniques in cloud and distributed systems. The document proposes a new Cloud Data Mining (CDM) algorithm that performs data mining in both cloud and non-cloud environments and compares the costs of each approach.
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICESijccsa
Cloud computing refers to a location that allows us to preserve our precious data and use computing and
networking services on a pay-as-you-go basis without the need for a physical infrastructure. Cloud
computing now provides us with powerful data processing and storage, exceptional availability and
security, rapid accessibility and adaption, ensured flexibility and interoperability, and time and cost
efficiency. Cloud computing offers three platforms (IaaS, PaaS, and SaaS) with unique capabilities that
promise to make it easier for a customer, organization, or trade to establish any type of IT business. We
compared a variety of cloud service characteristics in this article, following the comparing, it's
straightforward to pick a specific cloud service from the possible options by comparison with three chosen
cloud providers such as Amazon, Microsoft Azure, and Digital Ocean. By using findings of this study to not
only identify similarities and contrasts across various aspects of cloud computing, as well as to suggest
some areas for further study.
This document summarizes a study on a new dynamic load balancing approach in cloud environments. It begins by outlining some of the major challenges of load balancing in cloud systems, including uneven distribution of workloads across CPUs. It then proposes a new approach with three main components: 1) A queueing and job assignment process that prioritizes assigning jobs to faster CPUs, 2) A timeout chart to determine when jobs should be migrated or terminated to avoid delays, and 3) Use of a "super node" to act as a proxy and backup in case other nodes fail. The approach is intended to more efficiently distribute jobs and help cloud systems maintain optimal performance. Finally, the document discusses how this approach could be integrated into existing cloud architectures
A Survey of Ontology-based Information Extraction for Social Media Content An...ijcnes
The amount of information generated in the Web has grown enormously over the years. This information is significant to individuals, businesses and organizations. If analyzed, understood and utilized, it will provide a valuable insight to its stakeholders. However, many of these information are semi-structured or unstructured which makes it difficult to draw in-depth understanding of the implications behind those information. This is where Ontology-based Information Extraction (OBIE) and social media content analysis come into play. OBIE has now become a popular way to extract information coming from machine-readable sources. This paper presents a survey of OBIE, Ontology languages and tools and the process to build an ontology model and framework. The author made a comparison of two ontology building frameworks and identified which framework is complete.
Economic Growth of Information Technology (It) Industry on the Indian Economyijcnes
Information Technology (IT) is an important emerging sector of the Indian Economy. IT in India is an industry comprising of two noteworthy segments IT administrations and business process outsourcing (BPO).The segment has expanded its commitment to Indias GDP from 1.2% in 1998 to 9.3% in 2015. According to NASSCOM, the segment amassed incomes of US$147 billion out of 2015, with send out income remaining at US$99 billion and household income at US$48 billion, developing by more than 13%.Indias present Prime Minister Narendra Modi has begun a venture called �DIGITAL INDIA i.e., Computerized India to help secure IT a position both inside and outside of India. The IT sector has served as a fertile ground for the growth of a new entrepreneurial class with innovative corporate practices and has been instrumental in reversing the brain drain, raising Indias brand equity and attracting foreign direct investment (FDI) leading to other associated benefits. The Size of this sector has increased at a tremendous rate of 35% per year during the last 10 years. This Paper examines the India�s growth in IT industry and also studied the impact of IT on the Indian Economy.
More Related Content
Similar to A Survey on the Security Issues of Software Defined Networking Tool in Cloud Computing
Task Scheduling methodology in cloud computing Qutub-ud- Din
This document outlines a proposed methodology for developing efficient task scheduling strategies in cloud computing. It begins with introductions to cloud computing and task scheduling. It then reviews several relevant existing task scheduling algorithms from literature that focus on objectives like reducing costs, minimizing completion time, and maximizing resource utilization. The problem statement indicates the goals are to reduce costs, minimize completion time, and maximize resource allocation. An overview of the proposed methodology's flow is then provided, followed by references.
This document discusses security and privacy issues of fog computing based on a survey of existing work. It begins with an overview of fog computing, defining it as an extension of cloud computing to the edge of networks. It then identifies several key security and privacy challenges of fog computing, including issues of trust and authentication, network security, secure data storage, and secure and private data computation. Several potential solutions are also briefly discussed, such as reputation-based trust models, biometric authentication, software-defined networking for security, and techniques like homomorphic encryption to enable verifiable and private computation on outsourced data.
The document proposes an Inter-Cloud Architecture (ICA) to address integration and interoperability issues in heterogeneous multi-domain cloud environments. The key components of the ICA include: (1) a multi-layer Cloud Services Model for vertical integration of cloud services, (2) an Inter-Cloud Control and Management Plane for application/infrastructure control across clouds, and (3) an Inter-Cloud Federation Framework to federate independently managed cloud infrastructure from different providers. The ICA aims to facilitate on-demand provisioning of complex cloud infrastructure involving multiple providers and integration with legacy services.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Efficient architectural framework of cloud computing Souvik Pal
This document discusses an efficient architectural framework for cloud computing. It begins by providing background on cloud computing and discusses challenges such as security, privacy, and reliability. It then proposes a new architectural framework that separates infrastructure as a service (IaaS) into three sub-modules: IaaS itself, a hypervisor monitoring environment (HME), and resources as a service (RaaS). The HME acts as middleware between IaaS and physical resources, using a hypervisor to allocate resources from a pool managed by RaaS. This proposed framework is intended to improve performance and access speed for cloud computing.
A survey of models for computer networks managementIJCNCJournal
The virtualization concept along with its underlyin
g technologies has been warmly adopted in many fiel
ds
of computer science. In this direction, network vir
tualization research has presented considerable res
ults.
In a parallel development, the convergence of two d
istinct worlds, communications and computing, has
increased the use of computing server resources (vi
rtual machines and hypervisors acting as active
network elements) in network implementations. As a
result, the level of detail and complexity in such
architectures has increased and new challenges need
to be taken into account for effective network
management. Information and data models facilitate
infrastructure representation and management and
have been used extensively in that direction. In th
is paper we survey available modelling approaches a
nd
discuss how these can be used in the virtual machin
e (host) based computer network landscape; we prese
nt
a qualitative analysis of the current state-of-the-
art and offer a set of recommendations on adopting
any
particular method.
Cloud middleware and services-a systematic mapping reviewjournalBEEI
Cloud computing currently plays a crucial role in the delivery of vital information technology services. A unique aspect of cloud computing is the cloud middleware and other related entities that support applications and networks. A specific field of research may be considered, particularly as regards cloud middleware and services at all levels, and thus needs analysis and paper surveys to elucidate possible study limitations. The purpose of this paper is to perform a systematic mapping for studies that capture cloud computing middleware, stacks, tools and services. The methodology adopted for this study is a systematic mapping review. The results showed that more papers on the contribution facet were published with tool, model, method and process having 18.10%, 13.79%, 6.03% and 8.62% respectively. In addition, in terms of tool, evaluation and solution research had the largest number of articles with 14.17% and 26.77% respectively. A striking feature of the systemic map is the high number of articles in solution research with respect to all aspects of the features applied in the studies. This study showed clearly that there are gaps in cloud computing middleware and delivery services that would interest researchers and industry professionals desirous of research in this area.
Cloud computing security through symmetric cipher modelijcsit
Cloud computing can be defined as an application and services which runs on distributed network using
virtualized and it is accessed through internet protocols and networking. Cloud computing resources and
virtual and limitless and information’s of the physical systems on which software running are abstracted
from the user. Cloud Computing is a style of computing in which dynamically scalable and often virtualized
resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or
control over the technology infrastructure in the "cloud" that supports them. To satisfy the needs of the
users the concept is to incorporate technologies which have the common theme of reliance on the internet
Software and data are stored on the servers whereas cloud computing services are provided through
applications online which can be accessed from web browsers. Lack of security and access control is the
major drawback in the cloud computing as the users deal with sensitive data to public clouds .Multiple
virtual machine in cloud can access insecure information flows as service provider; therefore to implement
the cloud it is necessary to build security. Therefore the main aim of this paper is to provide cloud
computing security through symmetric cipher model. This article proposes symmetric cipher model in
order to implement cloud computing security so that data can accessed and stored securely.
This document discusses security issues in cloud computing. It begins by defining cloud computing and describing its service models and deployment models. It then identifies several key security issues in cloud computing, including security, privacy, reliability, lack of open standards, compliance, and concerns about long-term viability of data. Security is identified as the top challenge according to a survey of IT executives. The document argues that more must be done to address security, privacy, and other issues in order to fully realize the potential of cloud computing.
This document summarizes a research paper on the adoption of cloud computing in Nepal. The study found that both government and business organizations in Nepal have similar low levels of cloud computing adoption. Major barriers to adoption identified were security concerns, lack of connectivity, availability issues, vendor location restrictions, and legal uncertainties. The paper reviews the history and definitions of cloud computing. It also profiles existing cloud service providers in Nepal and the types of cloud services they offer. The research methodology used surveys and interviews to assess the current status of cloud adoption among organizations in Nepal.
A Threshold Secure Data Sharing Scheme for Federated CloudsIJORCS
The document proposes a secure data sharing scheme for federated clouds. The scheme uses a Trusted Cloud Authority (TCA) that controls participating clouds and generates private and public keys. Each cloud encrypts a secret value using its private key without knowing other clouds' values. They run a secure multi-party computation to calculate an encrypted sum polynomial. The TCA can later recover the original secret value from the sum polynomial without learning individual secret values. The scheme aims to ensure privacy and integrity of secret data shared between clouds during distributed computations.
This document provides a comprehensive study of cloud computing. It discusses cloud computing models including infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). It explores the benefits of cloud computing such as scalability, flexibility, and reduced costs. However, it also notes avoidance issues like security, privacy, internet dependency, and availability. The document concludes by stating that vertical scalability presents a technical challenge in cloud environments.
Cloud computing is Internet based development and use of computer technology. It is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or control over the technology infrastructure "in the cloud" that supports them. Cloud computing is a hot topic all over the world nowadays, through which customers can access information and computer power via a web browser. As the adoption and deployment of cloud computing increase, it is critical to evaluate the performance of cloud environments. Currently, modeling and simulation technology has become a useful and powerful tool in cloud computing research community to deal with these issues. Cloud simulators are required for cloud system testing to decrease the complexity and separate quality concerns. Cloud computing means saving and accessing the data over the internet instead of local storage. In this paper, we have provided a short review on the types, models and architecture of the cloud environment.
This document provides a review and comparison of cloud and grid computing. It begins with definitions of cloud computing and discusses the key characteristics of clouds such as scalability, on-demand access to resources, and utility-based pricing. It then describes the various cloud deployment models including public, private, hybrid and community clouds. The document outlines the architecture of cloud computing including virtual machines, physical machines, and a high-level market-oriented model. It provides Amazon's GrepTheWeb application as an example of a cloud-based architecture and discusses its scalability and cost advantages. In the conclusion, the document compares clouds to grids and their similarities and differences.
An Overview on Security Issues in Cloud ComputingIOSR Journals
This document discusses security issues in cloud computing. It begins by defining cloud computing and its service models, including software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS). It then discusses that security is the top challenge for cloud computing according to a survey of IT executives. Specifically, there are concerns about maintaining security, compliance, and control over critical applications and sensitive data when using public cloud environments. The document goes on to provide more details on cloud computing definitions, characteristics, architectures, and the specific security issues involved in cloud computing.
A Comparative Study: Taxonomy of High Performance Computing (HPC) IJECEIAES
The computer technologies have rapidly developed in both software and hardware field. The complexity of software is increasing as per the market demand because the manual systems are going to become automation as well as the cost of hardware is decreasing. High Performance Computing (HPC) is very demanding technology and an attractive area of computing due to huge data processing in many applications of computing. The paper focus upon different applications of HPC and the types of HPC such as Cluster Computing, Grid Computing and Cloud Computing. It also studies, different classifications and applications of above types of HPC. All these types of HPC are demanding area of computer science. This paper also done comparative study of grid, cloud and cluster computing based on benefits, drawbacks, key areas of research, characterstics, issues and challenges.
Review of Business Information Systems – Fourth Quarter 2013 V.docxmichael591
This document discusses security threats in cloud computing based on a case study interview with an IT manager. The interviewee's company uses both private and public clouds. The document identifies 41 security threats from literature and classifies them from technical and business perspectives. Based on the interview, the major drivers for using cloud computing were improving business continuity, reducing costs through virtualization and disaster recovery, and utilizing high bandwidth. The interview helped explore the dimensions of security threats in cloud computing beyond what is described in existing research.
A premeditated cdm algorithm in cloud computing environment for fpm 2IAEME Publication
This document discusses applying data mining techniques in a cloud computing environment. It begins with an introduction to cloud computing, describing its key characteristics including on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. The document then provides an overview of common data mining techniques like association, classification, clustering, prediction, and sequential patterns. It reviews recent studies applying these techniques in cloud and distributed systems. The document proposes a new Cloud Data Mining (CDM) algorithm that performs data mining in both cloud and non-cloud environments and compares the costs of each approach.
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICESijccsa
Cloud computing refers to a location that allows us to preserve our precious data and use computing and
networking services on a pay-as-you-go basis without the need for a physical infrastructure. Cloud
computing now provides us with powerful data processing and storage, exceptional availability and
security, rapid accessibility and adaption, ensured flexibility and interoperability, and time and cost
efficiency. Cloud computing offers three platforms (IaaS, PaaS, and SaaS) with unique capabilities that
promise to make it easier for a customer, organization, or trade to establish any type of IT business. We
compared a variety of cloud service characteristics in this article, following the comparing, it's
straightforward to pick a specific cloud service from the possible options by comparison with three chosen
cloud providers such as Amazon, Microsoft Azure, and Digital Ocean. By using findings of this study to not
only identify similarities and contrasts across various aspects of cloud computing, as well as to suggest
some areas for further study.
This document summarizes a study on a new dynamic load balancing approach in cloud environments. It begins by outlining some of the major challenges of load balancing in cloud systems, including uneven distribution of workloads across CPUs. It then proposes a new approach with three main components: 1) A queueing and job assignment process that prioritizes assigning jobs to faster CPUs, 2) A timeout chart to determine when jobs should be migrated or terminated to avoid delays, and 3) Use of a "super node" to act as a proxy and backup in case other nodes fail. The approach is intended to more efficiently distribute jobs and help cloud systems maintain optimal performance. Finally, the document discusses how this approach could be integrated into existing cloud architectures
Similar to A Survey on the Security Issues of Software Defined Networking Tool in Cloud Computing (20)
A Survey of Ontology-based Information Extraction for Social Media Content An...ijcnes
The amount of information generated in the Web has grown enormously over the years. This information is significant to individuals, businesses and organizations. If analyzed, understood and utilized, it will provide a valuable insight to its stakeholders. However, many of these information are semi-structured or unstructured which makes it difficult to draw in-depth understanding of the implications behind those information. This is where Ontology-based Information Extraction (OBIE) and social media content analysis come into play. OBIE has now become a popular way to extract information coming from machine-readable sources. This paper presents a survey of OBIE, Ontology languages and tools and the process to build an ontology model and framework. The author made a comparison of two ontology building frameworks and identified which framework is complete.
Economic Growth of Information Technology (It) Industry on the Indian Economyijcnes
Information Technology (IT) is an important emerging sector of the Indian Economy. IT in India is an industry comprising of two noteworthy segments IT administrations and business process outsourcing (BPO).The segment has expanded its commitment to Indias GDP from 1.2% in 1998 to 9.3% in 2015. According to NASSCOM, the segment amassed incomes of US$147 billion out of 2015, with send out income remaining at US$99 billion and household income at US$48 billion, developing by more than 13%.Indias present Prime Minister Narendra Modi has begun a venture called �DIGITAL INDIA i.e., Computerized India to help secure IT a position both inside and outside of India. The IT sector has served as a fertile ground for the growth of a new entrepreneurial class with innovative corporate practices and has been instrumental in reversing the brain drain, raising Indias brand equity and attracting foreign direct investment (FDI) leading to other associated benefits. The Size of this sector has increased at a tremendous rate of 35% per year during the last 10 years. This Paper examines the India�s growth in IT industry and also studied the impact of IT on the Indian Economy.
An analysis of Mobile Learning Implementation in Shinas College of Technology...ijcnes
In the past decade, technology has grown exponentially, especially the speed of the Internet and mobile technology have reached its peak it seems. This technology advancement also gives its impact to all the areas especially in the education sector. Researchers have to be interested in investigating how these technologies can be exploited for educational purposes aiming to enhance learning experiences. Subsequently, this has prompt an exploration slant which is ordinarily alluded to as Mobile Learning (M-Learning) in which specialists endeavors have meant to disseminate fitting learning encounters to learners considering their own flexibility needs, the universal usage of portable advances and the accessibility of data whenever � anyplace. By and by, m-learning is still in its start and extraordinary endeavors should be done as such as to explore the potential outcomes of educational outlook change from the conventional on-estimate fits-all illuminating ways to deal with a versatile and customized discovering that can be circulated by means of portable creations. This paper, presents the suitability and need of mobile learning facility in Shinas College of Technology(SHCT) and also presents the framework for implementing m-learning in SHCT.
We briefly discuss about the e-government which is about the finishing transactions between the government and the public through internet. First, we wrote about the three sectors of e-government which are between government and (government, citizens, business). Second, we wrote about benefits that users can get from using e-government. Third, we wrote about the challenges that e-government fac
Power Management in Micro grid Using Hybrid Energy Storage Systemijcnes
This paper proposed for power management in micro grid using a hybrid distributed generator based on photovoltaic, wind-driven PMDC and energy storage system is proposed. In this generator, the sources are together connected to the grid with the help of interleaved boost converter followed by an inverter. Thus, compared to earlier schemes, the proposed scheme has fewer power converters. FUZZY based MPPT controllers are also proposed for the new hybrid scheme to separately trigger the interleaved DC-DC converter and the inverter for tracking the maximum power from both the sources. The integrated operations of both the proposed controllers for different conditions are demonstrated through simulation with the help of MATLAB software
Holistic Forecasting of Onset of Diabetes through Data Mining Techniquesijcnes
This document discusses using data mining techniques to holistically forecast the onset of diabetes. It proposes augmenting an existing diabetes dataset with additional attributes related to common diabetes symptoms. The augmented dataset is analyzed using association rule mining algorithms like Apriori and FP-Growth to generate rules for predicting diabetes status. Several high confidence rules are presented that integrate multiple attributes to determine whether a patient is likely to be diabetic or not diabetic based on their symptoms. The study suggests this holistic approach using an expanded dataset could more accurately predict diabetes onset compared to prior studies using only conventional datasets.
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...ijcnes
The aim of this survey is to list the various disease predictions from retinal funds images and various methods used to detect the disease. This paper gives a detailed description about the various diseases predicted in retina by comparing retinal funds image structure. Till now, the prediction of various diseases such as diabetic retinopathy, cardiovascular disease and other eye problems had been predicted by using retinal funds images. Next, a comparative study of the various methods followed using image processing to find out the diseases from retinal funds images, is provided. The basic matrices observed to predict the diseases are optic disc,nerve cup and rim. To find the differences in the basic matrices, image processing techniques such as mask generation, colour normalization, edge detection, contrast enhancement are used. The datasets that are used for retinal image inputs are STARE, DRIVE, ONHSD, ARIA, IMAGERET. The survey at the end, discusses the future work for the possibilities of predicting gastreointestinal problems via retinal funds images.
Feature Extraction in Content based Image Retrievalijcnes
This document discusses feature extraction methods for content-based image retrieval (CBIR). It describes Order Dither Block Truncation Coding (ODBTC), an image compression technique that can be used to extract image features without decoding. The proposed CBIR system extracts two features from ODBTC-encoded images: Color Co-occurrence Feature (CCF) and Bit Pattern Feature (BPF). CCF is extracted from color quantizers produced by ODBTC, while BPF is based on a bit pattern codebook generated from ODBTC bitmap images. Experimental results show this approach provides superior retrieval accuracy compared to earlier CBIR methods.
Challenges and Mechanisms for Securing Data in Mobile Cloud Computingijcnes
Cloud computing enables users to utilize the services of computing resources. Now days computing resources in mobile applications are being delivered with cloud computing. As there is a growing need for new mobile applications, usage of cloud computing can not be overlooked. Cloud service providers offers the services for the data request in a remote server. Virtualization aspect of cloud computing in mobile applications felicitates better utilization of resources. The industry needs to address the foremost security risk in the underlying technology. The cloud computing environment in mobile applications aggravated with various security problems. This paper addresses challenges in securing data in cloud for mobile Cloud computing and few mechanisms to overcome.
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...ijcnes
Mobile ad-hoc networks(MANETs) assume that mobile nodes voluntary cooperate in order to work properly. This cooperation is a cost-intensive activity and some nodes can refuse to cooperate, leading to a selfish node behaviour. Thus, the overall network performance could be seriously affected. The use of watchdogs is a well-known mechanism to detect selfish nodes. However, the detection process performed by watchdogs can fail, generating false positives and false negatives that can induce to wrong operations. Moreover, relying on local watchdogs alone can lead to poor performance when detecting selfish nodes, in term of precision and speed. This is especially important on networks with sporadic contacts, such as delay tolerant networks (DTNs), where sometimes watchdogs lack of enough time or information to detect the selfish nodes. Thus, We apply chord algorithm to identify behavior pattern of one shelf by two neighborhood nodes and themselves. Servers will finally categories nature of node.
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...ijcnes
Efficient utilization of radio resources in wireless networks is crucial and has been investigated extensively. This letter considers a wireless relay network where multiple user pairs conduct bidirectional communications via multiple relays based on orthogonal frequency-division multiplexing (OFDM) transmission. The joint optimization of channel and relay assignment, including subcarrier pairing, subcarrier allocation as well as relay selection, for total throughput maximization is formulated as a combinatorial optimization problem. Using a graph theoretical approach, we solve the problem optimally in polynomial time by transforming it into a maximum weighted bipartite matching (MWBM) problem. Simulation studies are carried out to evaluate the network total throughput versus transmit power per node and the number of relay nodes
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networksijcnes
Appropriate routing protocol in data transfer is a challenging problem of network in terms of lower end-to-end delay in delivery of data packets with improving packet delivery ratio and lower overhead as well. In this paper we explain an effective and scalable AODV (called as AODV-ES) for Wireless Ad hoc Sensor Networks (WASN) by using third party reply model, n-hop local ring and time-to-live based local recovery. Our goal is to reduce time delay for delivery of the data packets, routing overhead and improve the data packet delivery ratio. The resulting algorithm AODV-ES is then simulated by NS-2 under Linux operating system. The performance of routing protocol is evaluated under various mobility rates and found that the proposed routing protocol is better than AODV.
Secured Seamless Wi-Fi Enhancement in Dynamic Vehiclesijcnes
At present, cellular networks provide ubiquitous Internet connection, but with relatively expensive cost. Furthermore, the cellular networks have been proven to be insufficient for the surging amount of data from Internet enabled mobile devices. Due to the explosive growth of the subscriber number and the mobile data, cellular networks are suffering overload, and the users are experiencing service quality degradation. In this project implement seamless and efficient Wi-Fi based Internet access from moving vehicles. In our proposed implementation, a group of APs are employed to communicate with a client (called AP diversity), and the transmission succeeds if any AP in the group accomplishes the delivery with the client (called opportunistic transmission). Such AP diversity and opportunistic transmission are exploited to overcome the high packet loss rate, which is achieved by configuring all the APs with the same MAC and IP addresses. With such a configuration, a client gets a graceful illusion that only one (virtual) AP exists, and will always be associated with this virtual AP. Uplink communications, when the client transmits a packet to the virtual AP, actually multiple APs within its transmission range are able to receive it. The transmission is successful as long as at least one AP receives the packet correctly. Proposed implementation will show that outperforms existing schemes remarkably.
Virtual Position based Olsr Protocol for Wireless Sensor Networksijcnes
This document summarizes a research paper on a virtual position-based routing protocol for wireless sensor networks. The protocol aims to address the "void routing problem" that occurs in geographic routing when a node has no neighbors that are closer to the destination. The proposed protocol maps node coordinates on the edges of voids to a virtual circle to transform the random network structure and allow greedy forwarding to continue. It divides the area around voids into three regions and applies different routing strategies in each region. Simulation results show the protocol achieves higher delivery rates, shorter paths, lower overhead and energy consumption compared to protocols using face routing to bypass voids.
Mitigation and control of Defeating Jammers using P-1 Factorizationijcnes
Jamming-resistant broadcast communication is crucial for safety-critical applications such as emergency alert broadcasts or the dissemination of navigation signals in adversarial settings. These applications share the need for guaranteed authenticity and availability of messages which are broadcasted by base stations to a large and unknown number of (potentially untrusted) receivers. Common techniques to counter jamming attacks such as Direct-Sequence Spread Spectrum (DSSS) and Frequency Hopping are based on secrets that need to be shared between the sender and the receivers before the start of the communication. However, broadcast anti jamming communication that relies on Pollards Rho Method. In this work, we therefore propose a solution called P-Rho Method to enables spread-spectrum anti-jamming broadcast communication without the requirement of shared secrets. complete our work with an experimental evaluation on a prototype implementation.
An analysis and impact factors on Agriculture field using Data Mining Techniquesijcnes
In computing and information huge amount of data was provided in the storage. The task is to extract the specified data from the raw data. Data mining is one of the techniques that will extract the data. Data mining techniques are used in many places. The techniques like K-means, K nearest neighbor, support vector machine, bi clustering, navie bayes classifier, neural networks and fuzzy C-means are applied on agricultural data. There are many factors in agriculture. The main factors for the farmer are climate, soil and yield prediction. Farmer must know To improve their production select suitable crop for suitable climate. This paper provides the various concepts of Data mining, their applications and also discusses the research field in agriculture. This paper discusses the different types of factors that impact in the agriculture field.
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...ijcnes
A code smell is an indication in the source code that hypothetically indicates a design problem in the equivalent software. The Code smells are certain code lines which makes problems in source code. It also means that code lines are bad design shape or any code made by bad coding practices. Code smells are structural characteristics of software that may indicates a code or drawing problem that makes software hard to evolve and maintain, and may trigger refactoring of code. In this paper, we proposed some success issues for smell detection tools which can assistance to develop the user experience and therefore the acceptance of such tools. The process of detecting and removing code smells with refactoring can be overwhelming.
Priority Based Multi Sen Car Technique in WSNijcnes
In Wireless sensor network (WSN), Clustering is an efficient mechanism used to overcome energy capability problem, routing and load balancing. This paper addresses energy utilization and load distribution between the clusters. The load balanced clustering algorithms (LBC) used to decrease the energy utilization and distribute load into clusters. The SenCar uses multi-user multi-input and multi-output (MU-MIMO) technique which is introduced the multi SenCar to collects the information from each cluster heads and upload the data in the base station. This method achieves more than 50 percent energy saving per node, 80 percent energy saving on cluster heads and also achieves less data collection time compared to the existing system
Semantic Search of E-Learning Documents Using Ontology Based Systemijcnes
The keyword searching mechanism is traditionally used for information retrieval from Web based systems. However, this system fails to meet the requirements in Web searching of the expert knowledge base based on the popular semantic systems. Semantic search of E-learning documents based on ontology is increasingly adopted in information retrieval systems. Ontology based system simplifies the task of finding correct information on the Web by building a search system based on the meaning of keyword instead of the keyword itself. The major function of the ontology based system is the development of specification of conceptualization which enhances the connection between the information present in the Web pages with that of the background knowledge.The semantic gap existing between the keyword found in documents and those in query can be matched suitably using Ontology based system. This paper provides a detailed account of the semantic search of E-learning documents using ontology based system by making comparison between various ontology systems. Based on this comparison, this survey attempts to identify the possible directions for future research.
Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...ijcnes
Cloud computing provides the capability to use computing and storage resources on a metered basis and reduce the investments in an organization�s computing infrastructure. The spawning and deletion of virtual machines running on physical hardware and being controlled by hypervisors is a cost-efficient and flexible computing paradigm. In addition, the integration and widespread availability of large amounts of sanitized information such as health care records can be of tremendous benefit to researchers and practitioners. However, as with any technology, the full potential of the cloud cannot be achieved without understanding its capabilities, vulnerabilities, advantages, and trade-offs. We propose a new method of achieving the maximum benefit from cloud computation with minimal risk. Issues such as data ownership, privacy protections, data mobility, quality of service and service levels, bandwidth costs, data protection, and support have to be tackled in order to achieve the maximum benefit from cloud computation with minimal risk.
Low power architecture of logic gates using adiabatic techniquesnooriasukmaningtyas
The growing significance of portable systems to limit power consumption in ultra-large-scale-integration chips of very high density, has recently led to rapid and inventive progresses in low-power design. The most effective technique is adiabatic logic circuit design in energy-efficient hardware. This paper presents two adiabatic approaches for the design of low power circuits, modified positive feedback adiabatic logic (modified PFAL) and the other is direct current diode based positive feedback adiabatic logic (DC-DB PFAL). Logic gates are the preliminary components in any digital circuit design. By improving the performance of basic gates, one can improvise the whole system performance. In this paper proposed circuit design of the low power architecture of OR/NOR, AND/NAND, and XOR/XNOR gates are presented using the said approaches and their results are analyzed for powerdissipation, delay, power-delay-product and rise time and compared with the other adiabatic techniques along with the conventional complementary metal oxide semiconductor (CMOS) designs reported in the literature. It has been found that the designs with DC-DB PFAL technique outperform with the percentage improvement of 65% for NOR gate and 7% for NAND gate and 34% for XNOR gate over the modified PFAL techniques at 10 MHz respectively.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
International Conference on NLP, Artificial Intelligence, Machine Learning an...
A Survey on the Security Issues of Software Defined Networking Tool in Cloud Computing
1. Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 06 Issue: 02 December 2017 Page No.27-33
ISSN: 2278-2400
27
A Survey on the Security Issues of Software
Defined Networking Tool in Cloud Computing
S.Karthiga1
, T.Velmurugan2
1
Research Scholar, 2
Associate Professor
PG and Research Department of Computer Science, D. G. Vaishnav College, Arumbakkam, Chennai-600106, India
E-Mail: 1
karthiga2191@gmail.com, 2
velmurugan_dgvc@yahoo.co.in,
Abstract: The Advent of the digital age has led to a rise
in different types of data with every passing day. In fact,
it is expected that half of the total data used around the
world will be on the cloud nowadays. This complex data
needs to be stored, processed and analyzed for
information gaining that can be used for several
organizations. Cloud computing provides an appropriate
platform for Software Defined Networking (SDN) in
communicating and computing requirements of the
latter. It makes cloud-based networking a viable
research field in the current scenario. However, several
issues addressed and risk needs to be mitigated in the L2
cloud server. Virtual networks and cloud federation
being considered in the network virtualization over L3
cloud router. This research work explores the existing
research challenges and discusses open issues for the
security in cloud computing and its uses in the relevant
field by means of a comparative analysis of L2 server
L3 router based on SDN tools. Also, an analysis of such
issues are discussed and summarized. Finally, the best
tool identified for the use cloud security.
Keywords: Software Defined Network, Cloud-Based
Networking, Cloud Security, Cloud Tools.
I. INTRODUCTION
Cloud computing is a model for enabling omnipresent,
self service, on-demand network access to a shared pool
of configurable computing resources (e.g., networks,
servers, storage, applications, and services) that can be
rapidly provisioned and released with minimal
management effort or service provider interaction.
Cloud computing is a specialized form of distributed
computing that introduces utilization models for
remotely provisioning scalable and measured
resources.The cloud model is composed of five essential
characteristics, three service models, and four
deployment models.
L. J. Zhang and Q. Zhou discussed its research paper
titled as ‘CCOA: Cloud Computing Open Architecture’
Cloud Computing provides surroundings for resource
sharing in application development platforms, and
business applications [1]. In the research paper titled as'
Cloud computing in academic institutions,' the term
Cloud Computing has been outlined in some ways by
analyst corporations, academics, business practitioners
and IT corporations [2]. Cloud computing system can be
divided into two sections: the front end and the back end
both sections are area unit connected with one another
through a network is discussed detail in the research
paper titled as ‘Cloud computing - Concepts,
architecture, and challenges by Y. Jadeja and K. Modi
[3].
Figure 1: Cloud computing
The architecture of Cloud Computing: The Physical
layer, the infrastructure layer, the platform layer and the
application layer, as indicated in figure 2.
Figure 2: Architecture of Cloud computing
2. Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 06 Issue: 02 December 2017 Page No.27-33
ISSN: 2278-2400
28
B. Grobauer, T. Walloschek described all layers in its
paper titled as ‘Understanding cloud computing
vulnerabilities’. The Application layer: The application
layer comprises of the actual cloud provisions [4].Cloud
Computing has different service models such as
Infrastructure as a Service (IAAS), Platform as a
Service (PAAS), and Software as a Service (SAAS) are
discussed in the survey paper titled as ’ A survey on
security issues in service delivery models of cloud
computing’ [5]. In Characteristics of Cloud Computing
are discussed in the paper ‘The characteristics of cloud
computing’ [6]. The Xu Wang; Beizhan Wang; Jing
Huang talks about the technique used to resources it
needs to return cloud rather than visible entity [7].
Deployment of Cloud Computing: Clouds can
generally be deployed according to the owner of the
Cloud data centers. A Cloud atmosphere will comprise
either one Cloud or multiple Clouds are discussed in the
paper ‘Examining cloud computing adoption intention,
pricing mechanism, and deployment model’ [8] (see
figure 3).
Figure 3: Cloud Deployment model
In public cloud, users access to the services
victimization external interfaces which may be offered
by internet browsers via web. The users share a standard
cloud infrastructure are discussed by A. Li et al. [9]. In
the book titled as ‘Private Cloud Computing’ decribes
about private clouds operation is inside associate
organization's internal enterprise information center.
Non-public cloud is often compared to computer
network [10]. The Cloud Computing Security Alliance
are discussed by A. Marinos and G. Briscoe in its paper
[11].Hybrid cloud is a combination of two or more
clouds (private, community, or public) that remain
unique entities is detailed in the survey paper titled as
‘Emerging Hybrid Cloud Patterns’ [12].Cloud
computing offers several technical and economic
benefits are discussed in this paper.
The main goal of this article is to discuss the Cloud
Computing Network Security, which motivate research
on cloud-based networking. The Organization of this
paper is structured as follows. Section II describes the
basic ideas about Cloud Computing Networks. A
number of research works are taken and compared,
which are based on the concept of Cloud Computing
Security is carried out in Section III. Finally, Section IV
concludes the research work.
II. CLOUD COMPUTING NETWORKS
The novel concept of cloud computing allows for more
applications for internet users [13]. Cloud computing is
currently used many commodity nodes that can
cooperate to perform a specific service together is
proved in the research paper titled as ‘Understanding
cloud computing vulnerabilities’ [13,4]. In a book titled
as ‘The future of cloud computing’ is discussed detail
the concept of cloud computing environment, users can
access the operational capability faster with internet
application [14]. The computer systems have the high
stability to handle the service requests from many users
in the environment is discussed by I. Foster et al. in its
paper [15]. The advantage of cloud computing and
make each task to obtain the required resources in the
shortest time is an important topic is discussed in a
research paper titled as ‘Towards a load balancing in a
three-level cloud computing network’ [16][17].
A computer network starts with a Network Interface
Card (NIC) in the host, which is connected to a layer 2
(L2) network (Ethernet, WiFi, etc.) segments are
discussed in the research paper ‘Cloud Computing:
Issues and Challenges’ [18]. N. Santos discussed in its
research paper about L2/L3 networks, a single data
center may have several L2/L3 networks. Several data
centers may be interconnected via L2/L3 switches [19].
In ‘Secure virtualization for cloud computing’ described
network components NIC, L2 n/w, L2switch, L3 n/w,
L3 routers, data centers, and the Internet needs to be
virtualized [20]. H. Hiroaki et al. discussed in its paper
titled as’ Dynamic IP-VPN architecture for cloud
computing ‘ about the developments of mobile IP [21] .
In ‘The case for cloud computing' research paper
discussed a network connection spans multiple L2
networks via L3 routers [22].
Handel et al. discussed in its paper about the concept of
packet headers and their functions are arranged in an
orderly fashion according to the open-systems
interconnection (OSI) reference model [23].In ‘Physical
mechanism of current-free double layers’ discussed
about the physical layer, is concerned with the
transmission of a bit over a physical link [24]. J. Esler
3. Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 06 Issue: 02 December 2017 Page No.27-33
ISSN: 2278-2400
29
described the data link layer, provides mechanisms for
the transfer of frames of data across a single physical
link frame [25]. R. Sherwood et al., discussed about
the network layer, it provides network-wide packet
delivery and switching functionality [26]. J. Salowey et
al. discussed about the transport layer, can provide
mechanisms for end-to-end delivery of packets [27].
Layer 5 (the session layer), Layer 6 (the presentation
layer), and Layer 7 (the application layer) perform
higher-level functions such as communication session
management, data formatting, data encryption, and data
compression are discussed in the research paper titled as
‘Large-scale electrophysiology: Acquisition,
compression, encryption, and storage of big data’ [28].
C. Guo et al. discussed in its paper about ISPs
additional network access capabilities, such as Virtual
Private Networking (VPN), using protocols such as
L2TP (Layer 2 Tunneling Protocol titled as ) ‘BCube: a
high performance, server-centric network architecture
for modular data centers’ [29]. W. Simpson discussed
about Point-to-Point Protocol (PPP) layer 2 links
established and its connection in its research paper titled
‘The Point-to-Point Protocol ( PPP ) Status of this
Memo’ [30]. The ISP sets up a packet tunnel to a home
gateway (HGW) in IP packets are discussed in the
research paper titled ‘ISP-friendly live P2P
streaming’[31]. ‘Rapid, Time-Division multiplexed,
Direct Absorption and wavelength modulation-
spectroscopy' as titled research paper discussed VoIP, a
voice data stream is packetized and transmitted over the
packet network [32]. Software-defined networking has
applications in a wide variety of networked
environments. S. Barkai, R. Katz, D. Farinacci, and D.
Meyer, discussed different environments for which
SDN solutions have been proposed or implemented
[33].
III. CLOUD COMPUTING SECURITY
Information Security should cover a number of
suggested themes as per the International Standards
Organization (ISO). Cloud computing security should
be guided in this regard in order to become a secure and
effective technology solution. Figure 2, illustrating the
information security requirements with the cloud
computing deployment model and delivery models
which has been adapted by Eloff et al. [34]. In Figure 2,
the different cloud delivery models and deployment
models are matched against the information security
requirements.
Shaikh et al. discussed the identification and
authentication in cloud computing, depending on the
type of cloud it specify the users must be established
and supplementary access priorities and permission are
discussed in the paper [35]. The management of
security in Cloud computing is explored by Ramgovind
et al. in [36]. In Cloud computing, confidentiality plays
a vital role in maintaining and controlling organizations
data situated across multiple distributed databases and
cloud applications is discussed in ‘Protection of Users
Data Confidentiality in Cloud Computing’ by S. S. Yau
et al. [37]. The integrity requirement lies in applying the
due diligence within the cloud domain mainly when
accessing data. Therefore ACID (atomicity, consistency,
isolation, and durability) properties of the cloud's data
should without a doubt be robustly imposed across all
Cloud computing delivery models [15]. The titled ‘Data
security in the world of cloud computing’ discussed
about Non-repudiation in cloud computing can be verify
using e-commerce security protocols and token
provisioning to data transmission within cloud
applications [38]. The service level agreement is the
most important document which highlights the
trepidation of availability in cloud services and
resources between the cloud provider and client ,
exploring by the information is discussed by O. Rebollo
et al. [39].
Managing cloud computing security: In order to
manage and control the cloud technology in all places
the potential impact of Cloud computing on their
competitive edge are discussed in the survey paper titled
as ‘Security Guidance Critical Areas of Focus for
Critical Areas of Focus in Cloud Computing V2.1’ [40].
A Cloud framework that specifically addresses, senior
professionals, organizations information security and
management of cloud computing guidelines are
discussed in the paper ‘Data Security and Privacy
Protection Issues in Cloud Computing’ [41].
The use of HTTPS together with WS Security should be
a bare minimum when logging on to access data using
Cloud computing are discussed detail in the survey
paper ‘An analysis of cloud computing security issues’
[42]. S. Zawoad and R. Hasan discussed about WS-
Security assists with SOAP messages by defining the
header that carries the WS-Security extensions are
exposed in the paper ‘A trustworthy cloud forensics
environment paper’ [43]. In the book titled ‘The Tower
and the Cloud’, Richard Katz focuses on many areas
where the cloud may impose on education. Potential
Cloud organizations and vendor clouds by moving
towards a single cloud interface are discussed in the
book [43, 44].
With increased employment of cloud computing comes
increasingly frequent cloud computing security
incidents. Arguably many of the incidents described as
"cloud security" in fact just reflect traditional web
4. Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 06 Issue: 02 December 2017 Page No.27-33
ISSN: 2278-2400
30
application and data-hosting problems are discussed in
the paper ‘Security in cloud computing: Opportunities
and challenges’[44] . In Addressing cloud computing
security issues highlighted in the paper ‘Addressing
cloud computing security issues’ [45] . R. Buyya, C. S.
Yeo, and S. Venugopal proposed about data outsourcing
and assurance, and virtual machines. The field primarily
manifests as a blend of existing topics, rather than a set
of papers with an exclusive focus on cloud security [46].
The “black hat” community has discovered cloud
computing exploits that reflect extensions of existing
vulnerabilities in Black Hat USA 2009 is discussed in
Handbook of Cloud Computing book [47].In the Attack
surfaces: A taxonomy for attacks on cloud services is
discussed about Social engineering attacks remain
effective one exploit tries to convince Amazon Elastic
Compute Cloud (EC2) users such as “fedora_core" [48].
Table 1: Results Comparison
Referen
ce
Author Problem
identified
Result
[1] L. J. Zhang
and Q. Zhou
Seven
architectura
l Principles
and ten
architectura
l Modules
CCOA is an
extensible
and
configurable
architecture
for
providing
normative
guidance
[4] B. Grobauer,
T.
Walloschek,
and E.
Stöcker
Cloud-
specific
issues and
to clarify
the
discussions
regarding
vulnerabilit
ies
Indicators
based on
sound
definitions
of risk
factors and
cloud
computing.
[7] S. Marston,
Z. Li, S.
Bandyopadhy
ay, J. Zhang,
and A.
Ghalsasi
Business-
related
issues-CC
Optical risk
Transfer and
SLA
contract
design is the
form of
reporting
security
[8] P. F. Hsu, S.
Ray, and Y.
Y. Li-Hsieh
Cloud
Service
adoption
that deals
pricing
mechanism
Cloud
literature by
investigating
the
multifaceted
nature of
and
deployment
model
cloud
[13] F. Alagöz, A.
C. Valdez, W.
Wilkowska,
M. Ziefle, S.
Dorner, and
A. Holzinger
Mobile e-
health and
wellness
applications
of
accelerating
health
Cloud-based
healthcare
and wellness
application
will prove
themselves
[16] M. Armbrust
et al.,
The cost
and storage
and
networking
Computing,
storage, and
networking
must all
focus on
horizontal
scalability of
virtualized
resources
rather than
on single
node
performance
[17] S. C. Wang,
K. Q. Yan,
W. P. Liao,
and S. S.
Wang
Discussed
load
balancing,
scheduling,
and cloud
computing
Load
balancing by
OLB
scheduling
algorithm,
LBMM
scheduling
algorithm is
utilized
[18] T. Dillon, C.
Wu, and E.
Chang
SOA and
Grid
computing
related to
cloud
computing
The
interoperabil
ity issues are
highlighted
and number
of solution
are
discussed in
this paper
[20] F. Lombardi
and R. Di
Pietro
Security
issues and
affection
Secure via
virtualizatio
n, Novel
advanced
architecture
for cloud
protection
[21] H. Hiroaki,
Y. Kamizuru,
A. Honda, T.
Hashimoto,
K. Shimizu,
and H. Yao
Dynamic
IP-VPN
which is
used for
cloud
computing
Cloud
computing
environment
and IP-VPN
5. Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 06 Issue: 02 December 2017 Page No.27-33
ISSN: 2278-2400
31
services
[22] R. L.
Grossman
Difference
of cloud
and cloud
computing
Cloud and
cloud
computing
by using
cluster and
distributed
computing.
[26] R. Sherwood
et al.,
switch
virtualizatio
n in which
the same
hardware
forwarding
plane can
be shared
among
multiple
logical
networks
Packets are
sliced and
send into the
logical
networks
[33] S. Barkai, R.
Katz, D.
Farinacci, and
D. Meyer
The use of
software-
defined
flow
mapping
for scale-
assembly of
virtual
functions
features-
capacity
LISP-based
SDN
overlays can
implement
such
interconnect
for
virtualized
functions by
surrounding
data-center
spines or
national
backbones.
[34] J. Brodkin Seven
cloud-
computing
security
risks
To describe
the 7
different
types of
cloud
computing
risk factors
[35] F. B. F.
Shaikh and S.
Haider
Security
Threats
Different
types of
security
Threats via
Cloud
computing
are
discussed
[36] S. Ramgovind
et al.
Data
security
Precaution
and safety
issues to
secure the
data in cloud
computing
[37] S. S. Yau and
H. G. An
Manage the
security in
cloud
computing
Key security
consideratio
ns and
challenges
which are
currently
faced in the
Cloud
computing
industry are
discussed
[39] O. Rebollo,
D. Mellado,
E. Fernández-
Medina, and
H. Mouratidis
Framework Discussed
E-
Governance
framework
[41] D. Chen and
H. Zhao
CSA The Author
focused the
critical area
of cloud
security like
segmentatio
n
[47] N. Gruschka
and M.
Jensen
Taxonomy
of attackers
Data
security
from
attackers,
intruders,
and hackers.
Protection of
data
III. CONCLUSION
Security is the very important and essential task in the
current field of data analysis and some network oriented
transactions. This work identifies some of the general
issues and challenges in cloud security. Cloud security
can be seen a new phenomenon which is set to
revolutionize the way used on the internet; there are
security issues to identify the cautious in Cloud Security
Protocols. However, it is just very careful to understand
the limitations and security risks posed in utilizing these
technologies. Usually, no exception provided for the
network security by the cloud service providers. Cloud
Computing Networks has the potential to become a
frontrunner in promoting a Security to data, Virtual and
Economically viable in IT solution and to standardized
Cloud Computing Security Protocols through layer2
server and layer3 routers. A number of security issues
and their challenges are discussed in this work. Hence,
this survey work identifies that the SDN protocol
performs well for the cloud security compared with
other type of protocols in the same context.
6. Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 06 Issue: 02 December 2017 Page No.27-33
ISSN: 2278-2400
32
References
[1] L. J. Zhang and Q. Zhou, “CCOA: Cloud
Computing Open Architecture”, IEEE Int. Conf. on
Web Services, 2009, pp. 607–616.
[2] S. A. Mokhtar, S. H. S. Ali, A. Al-Sharafi, and A.
Aborujilah, “Cloud computing in academic
institutions”, Proc. 7th Int. Conf. Ubiquitous Inf.
Manag. Commun., 2013 pp. 1–7.
[3] Y. Jadeja and K. Modi, “Cloud computing -
Concepts, architecture and challenges”, in 2012 Int.
Conf. on Computing, Electronics and Electrical
Technologies , pp. 877–880.
[4] B. Grobauer, T. Walloschek, and E. Stöcker,
“Understanding cloud computing vulnerabilities”,
IEEE Security. Priv. Vol. 9, No. 2,2011, pp. 50–57.
[5] S. Subashini and V. Kavitha, “A survey on security
issues in service delivery models of cloud
computing”, Journal of Network and Computer
Applications, Vol. 34, No. 1,2011, pp. 1–11.
[6] C. Gong, J. Liu, Q. Zhang, H. Chen, and Z. Gong,
“The characteristics of cloud computing”, in
Proceedings of the Int. Conf. on Parallel Processing
Workshops, 2010, pp. 275–279.
[7] S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang, and
A. Ghalsasi, “Cloud computing - The business
perspective”, Decis. Support Syst.Vol. 51, No.
1,2011, pp. 176–189.
[8] P. F. Hsu, S. Ray, and Y. Y. Li-Hsieh, “Examining
cloud computing adoption intention, pricing
mechanism, and deployment model”, Int. J. Inf.
Manage. Vol. 34, No. 4,2014, pp. 474–488.
[9] A. Li, X. Yang, S. Kandula, and M. Zhang,
“CloudCmp: Comparing Public Cloud Providers”,
Proc. 10th Annu. Conf. Internet Meas. -
IMC10,2010, pp. 1-7.
[10]S. R. Smoot and N. K. Tan, "Private Cloud
Computing", eBook ISBN: 9780123849205 Eds-
1,2012.
[11]A. Marinos and G. Briscoe, "Community cloud
computing Conference paper Community Cloud
Computing", in the first int. conf. on cloud
computing, No. 1,2009, pp. 1–4.
[12]D. S. Linthicum, “Emerging Hybrid Cloud
Patterns,” IEEE Cloud Comput., Vol. 3, No.
1,2016, pp. 88–91.
[13]F. Alagöz, A. C. Valdez, W. Wilkowska, M. Ziefle,
S. Dorner, and A. Holzinger, “From cloud
computing to mobile internet, from user focus to
culture and hedonism - The crucible of mobile
health care and wellness applications”, in ICPCA10
- 5th Int. Conf. on Pervasive Computing and
Applications, 2010, pp. 38–45.
[14]E. G. Report, “The future of cloud computing”,
Analysis, Vol. 1, No. 1,2010, pp. 1–26.
[15]I. Foster, Y. Zhao, I. Raicu, and S. Lu, “Cloud
Computing and Grid Computing 360-degree
compared”, in Grid Computing Environments
Workshop, GCE 2008.
[16]M. Armbrust et al., “A view of cloud computing”,
Commun. ACM2010, Vol. 53, No. 4, 2010,pp. 50-
57.
[17]S. C. Wang, K. Q. Yan, W. P. Liao, and S. S.
Wang, “Towards a load balancing in a three-level
cloud computing network”, in Proc Int. Conf. on
Computer Science and Information Technology,
Vol. 1,2010, pp. 108–113.
[18]T. Dillon, C. Wu, and E. Chang, “Cloud
Computing: Issues and Challenges”, in 24th IEEE
Int. Conf. on Advanced Information Networking
and Applications, 2010, pp. 27–33.
[19]N. Santos, K. P. Gummadi, and R. Rodrigues,
“Towards trusted cloud computing”, Proc of the
conf. on Hot topics in cloud computing 2009. pp.
5-7.
[20]F. Lombardi and R. Di Pietro, “Secure
virtualization for cloud computing”, J. Netw.
Comput. Appl., Vol. 34, No. 4, 2011, pp. 1113–
1122.
[21]H. Hiroaki, Y. Kamizuru, A. Honda, T. Hashimoto,
K. Shimizu, and H. Yao, “Dynamic IP-VPN
architecture for cloud computing”, Inf.
Telecommun. Technol. (APSITT),8th Asia-Pacific
Symp., 2010.
[22]R. L. Grossman, “The case for cloud computing,”
IT Prof., Vol. 11, No. 2,2009, pp. 23–27.
[23]Handel, Theodore G., and Maxwell T. Sandford.
"Hiding data in the OSI network model", In Int.
Workshop on Information Hiding, Springer, Berlin,
Heidelberg, 1996. pp. 23-38.
[24]F. F. Chen, “Physical mechanism of current-free
double layers”, Phys. Plasmas, Vol. 13, No.
3,2006,pp-28-32.
[25]J. Esler, “Detecting and responding to data link
layer attacks”, SANS Institute. 2010, pp 1-25.
[26]R. Sherwood et al., “FlowVisor: A Network
Virtualization Layer”, Network, 2009, pp. 15-23.
[27]J. Salowey, T. Petch, R. Gerhards, and H. Feng,
“Datagram Transport Layer Security (DTLS)
Transport Mapping for Syslog”, RFC 6012
IETF2010, pp. 1–12.
[28]B. H. Brinkmann, M. R. Bower, K. A. Stengel, G.
A. Worrell, and M. Stead, “Large-scale
electrophysiology: Acquisition, compression,
encryption, and storage of big data”, J. Neurosci.
Methods, Vol. 180, No. 1,2009, pp. 185–192.
[29]C. Guo, G. Lu, D. Li, H. Wu, and X. Zhang,
“BCube: a high performance, server-centric
network architecture for modular data centers”,
7. Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 06 Issue: 02 December 2017 Page No.27-33
ISSN: 2278-2400
33
SIGCOMM ’09 Proc. ACM SIGCOMM Conf.
Data Commun.,2009, pp. 63–74.
[30]W. Simpson, “The Point-to-Point Protocol ( PPP )
Status of this Memo”, Control, 1994.
[31]N. Magharei, R. Rejaie, I. Rimac, V. Hilt, and M.
Hofmann, “ISP-friendly live P2P streaming”,
IEEE/ACM Trans. Netw.,Vol. 22, No. 1,2014, pp.
244–256.
[32]A. Klein, O. Witzel, and V. Ebert, "Rapid, Time-
Division multiplexed, Direct Absorption and
wavelength modulation-spectroscopy," Sensors
(Switzerland), Vol. 14, No. 11,2014, pp. 21497–
21513.
[33]S. Barkai, R. Katz, D. Farinacci, and D. Meyer,
"Software-defined flow-mapping for scaling
virtualized network functions", Softw. Define.
Netw.,2013, pp. 149–150.
[34]J. Brodkin, “Gartner: Seven cloud-computing
security risks”, InfoWorld, Vol. 2, 2008, pp. 2–3.
[35]F. B. F. Shaikh and S. Haider, “Security threats in
cloud computing”, Int. Conf. Internet Technol.
Secure. Trans., No. 1, 2011, pp. 214–219.
[36]S. Ramgovind, M. Eloff, and E. Smith, “The
management of security in Cloud computing”, Inf.
Secure. South Africa (ISSA), 2010, pp. 1–7.
[37]S. S. Yau and H. G. An, “Protection of Users’ Data
Confidentiality in Cloud Computing”, Syst.
Eng.,2010, pp. 1–6.
[38]L. M. Kaufman, “Data security in the world of
cloud computing”, IEEE Security. Priv., Vol. 7, No.
4,2009, pp. 61–64.
[39]O. Rebollo, D. Mellado, E. Fernández-Medina, and
H. Mouratidis, “Empirical evaluation of a cloud
computing information security governance
framework”, Inf. Softw. Technol.,Vol. 58,2015, pp.
44–57.
[40]CSA, “Security Guidance Critical Areas of Focus
for Critical Areas of Focus in Cloud Computing
V2.1,” Cloud Security. Alliance, Vol. 1, No.
1,2009, pp. 1–76.
[41]D. Chen and H. Zhao, “Data Security and Privacy
Protection Issues in Cloud Computing”, Int. Conf.
Comput. Sci. Electron. Eng., Vol. 1, No. 973, 2012,
pp. 647–651.
[42]A Behl and K. Behl, “An analysis of cloud
computing security issues”, Inf. Commun. Technol.
(WICT), World Congr.,2012, pp. 109–114.
[43]S. Zawoad and R. Hasan, “A trustworthy cloud
forensics environment”, in IFIP Advances in
Inform and Comm Tech, Vol. 462, 2015,pp. 271–
285.
[44]M. Ali, S. U. Khan, and A. V. Vasilakos, “Security
in cloud computing: Opportunities and challenges”,
Inf. Sci. (NY).,Vol. 305,2015, pp. 357–383.
[45]D. Zissis and D. Lekkas, “Addressing cloud
computing security issues”, Futur. Gener. Comput.
Syst.,Vol. 28, No. 3,2012, pp. 583–592.
[46]R. Buyya, C. S. Yeo, and S. Venugopal, “Market-
oriented cloud computing: Vision, hype, and reality
for delivering IT services as computing utilities”,
Proc.of 10th IEEE Int. conf. on High Performance
Computing and Comm, 2008, pp. 5–13.
[47]P. Bientinesi, R. Iakymchuk, and J. Napper,
“Handbook of Cloud Computing (2010)”, Handb.
Cloud Comput.,2010, pp. 493–516.
[48]N. Gruschka and M. Jensen, “Attack surfaces: A
taxonomy for attacks on cloud services”, IEEE 3rd
Int. Conf. on Cloud Computing, 2010, pp. 276–
279.