This document summarizes security issues related to cloud computing. It begins by introducing cloud computing and its benefits, including scalability, flexibility, and a pay-as-you-go model. However, it notes that security is a major concern for cloud computing. It then analyzes specific security threats like multi-tenancy allowing access to competitors' data, potential for data loss and leakage, easy accessibility opening the cloud to malicious users, and challenges of identity management with multiple technologies. The document provides an overview of cloud computing deployment models and service models to provide context on the discussed security issues.
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Total interpretive structural modelling on enablers of cloud computingeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Cloud computing security through symmetric cipher modelijcsit
Cloud computing can be defined as an application and services which runs on distributed network using
virtualized and it is accessed through internet protocols and networking. Cloud computing resources and
virtual and limitless and information’s of the physical systems on which software running are abstracted
from the user. Cloud Computing is a style of computing in which dynamically scalable and often virtualized
resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or
control over the technology infrastructure in the "cloud" that supports them. To satisfy the needs of the
users the concept is to incorporate technologies which have the common theme of reliance on the internet
Software and data are stored on the servers whereas cloud computing services are provided through
applications online which can be accessed from web browsers. Lack of security and access control is the
major drawback in the cloud computing as the users deal with sensitive data to public clouds .Multiple
virtual machine in cloud can access insecure information flows as service provider; therefore to implement
the cloud it is necessary to build security. Therefore the main aim of this paper is to provide cloud
computing security through symmetric cipher model. This article proposes symmetric cipher model in
order to implement cloud computing security so that data can accessed and stored securely.
Cloud computing has become one of the most interesting topics in the IT world today. Cloud model of computing as a resource has changed the landscape of computing as it promises of increased greater reliability, massive scalability, and decreased costs have attracted businesses and individuals alike. It adds capabilities to Information Technology’s. Over the last few years, cloud computing has grown considerably in Information Technology. As more and more information of individuals and companies are placed in the cloud, there is a growing concern about the safety of information. Many Companies that are considered to be giants in software industry like Microsoft are joining to develop Cloud services [1]. Despite the hype about the cloud, customers are reluctant to deploy their business in the cloud. Security issues is one of the biggest concerns that has been affecting the growth of cloud computing .It adds complications with data privacy and data protection continues to affect the market. Users need to understand the risk of data breaches in the cloud environment. The paper highlights issues related to cloud computing.
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
The Most great challenging in Cloud computing is Security. Here Security plays key role
in this paper proposed concept mainly deals with security at the end user access. While coming to the
end user access that are connected through the public networks. Here the end user wants to access his
application or services protected by the unauthorized persons. In this area if we want to apply
encryption or decryption methods such as RSA, 3DES, MD5, Blow fish. Etc.,
Whereas we can utilize these services at the end user access in cloud computing. Here there is
problem of encryption and decryption of the messages, services and applications. They are is lot of
time to take encrypt as well as decrypt and more number of processing capabilities are needed to use
the mechanism. For that problem we are introducing to use of cloud computing in SaaS model. i.e.,
scalable is applicable in this area so whenever it requires we can utilize the SaaS model.
In Cloud computing use of computing resources (hardware and software) that are delivered as a
service over Internet network. In advance earlier there is problem of using key size in various
algorithm like 64 bit it take some long period to encrypt the data.
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Total interpretive structural modelling on enablers of cloud computingeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Cloud computing security through symmetric cipher modelijcsit
Cloud computing can be defined as an application and services which runs on distributed network using
virtualized and it is accessed through internet protocols and networking. Cloud computing resources and
virtual and limitless and information’s of the physical systems on which software running are abstracted
from the user. Cloud Computing is a style of computing in which dynamically scalable and often virtualized
resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or
control over the technology infrastructure in the "cloud" that supports them. To satisfy the needs of the
users the concept is to incorporate technologies which have the common theme of reliance on the internet
Software and data are stored on the servers whereas cloud computing services are provided through
applications online which can be accessed from web browsers. Lack of security and access control is the
major drawback in the cloud computing as the users deal with sensitive data to public clouds .Multiple
virtual machine in cloud can access insecure information flows as service provider; therefore to implement
the cloud it is necessary to build security. Therefore the main aim of this paper is to provide cloud
computing security through symmetric cipher model. This article proposes symmetric cipher model in
order to implement cloud computing security so that data can accessed and stored securely.
Cloud computing has become one of the most interesting topics in the IT world today. Cloud model of computing as a resource has changed the landscape of computing as it promises of increased greater reliability, massive scalability, and decreased costs have attracted businesses and individuals alike. It adds capabilities to Information Technology’s. Over the last few years, cloud computing has grown considerably in Information Technology. As more and more information of individuals and companies are placed in the cloud, there is a growing concern about the safety of information. Many Companies that are considered to be giants in software industry like Microsoft are joining to develop Cloud services [1]. Despite the hype about the cloud, customers are reluctant to deploy their business in the cloud. Security issues is one of the biggest concerns that has been affecting the growth of cloud computing .It adds complications with data privacy and data protection continues to affect the market. Users need to understand the risk of data breaches in the cloud environment. The paper highlights issues related to cloud computing.
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
The Most great challenging in Cloud computing is Security. Here Security plays key role
in this paper proposed concept mainly deals with security at the end user access. While coming to the
end user access that are connected through the public networks. Here the end user wants to access his
application or services protected by the unauthorized persons. In this area if we want to apply
encryption or decryption methods such as RSA, 3DES, MD5, Blow fish. Etc.,
Whereas we can utilize these services at the end user access in cloud computing. Here there is
problem of encryption and decryption of the messages, services and applications. They are is lot of
time to take encrypt as well as decrypt and more number of processing capabilities are needed to use
the mechanism. For that problem we are introducing to use of cloud computing in SaaS model. i.e.,
scalable is applicable in this area so whenever it requires we can utilize the SaaS model.
In Cloud computing use of computing resources (hardware and software) that are delivered as a
service over Internet network. In advance earlier there is problem of using key size in various
algorithm like 64 bit it take some long period to encrypt the data.
A traditional computing environment requires a costly
infrastructure to offer a better service to users. The introduction
of cloud computing has changed the working environment from
traditional to virtual. A larger number of IT companies are
utilizing the cloud. On the one hand, the cloud attracts more
number of consumers by offering services with minimized
capital cost and virtual infrastructure. On the other hand, there
are a risk and security challenges in cloud computing that
makes the user not to move completely towards it. The cloud
environment is more vulnerable to security breaches and data
theft. Moreover, insider attacks are more frequent in larger
enterprises. An unauthenticated user can cause more damage
to company reputation. The cloud service providers are trying
to provide a secure work environment for users. However,
there is a lack of global standards and policies to invoke
security measures in cloud computing. This study aims to
highlight and classify security challenges and trust issues in the
cloud environment.
The survey was conducted in various institutions and
governmental organizations in Saudi Arabia to study the
opinions of stakeholders on cloud computing security
challenges and risks.
Links:
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...iosrjce
Cloud computing is an important transition that makes change in service oriented computing
technology. Cloud service provider follows pay-as-you-go pricing approach which means consumer uses as
many resources as he need and billed by the provider based on the resource consumed. CSP give a quality of
service in the form of a service level agreement. For transparent billing, each billing transaction should be
protected against forgery and false modifications. Although CSPs provide service billing records, they cannot
provide trustworthiness. It is due to user or CSP can modify the billing records. In this case even a third party
cannot confirm that the user’s record is correct or CSPs record is correct. To overcome these limitations we
introduced a secure billing system called THEMIS. For secure billing system THEMIS introduces a concept of
cloud notary authority (CNA). CNA generates mutually verifiable binding information that can be used to
resolve future disputes between user and CSP. This project will produce the secure billing through monitoring
the service level agreement (SLA) by using the SMon module. CNA can get a service logs from SMon and stored
it in a local repository for further reference. Even administrator of a cloud system cannot modify or falsify the
data.
Services, security challenges and security policies in cloud computingeSAT Journals
Abstract Cloud computing is becoming most emerging trend in IT industry. With its potential growth and lucrative services cloud computing has acquired mass market in the industry large enterprises running their business on the cloud. A greater acceptance of public cloud by various businesses has given it a wide popularity, strengthening of public cloud security is big milestone. The public cloud acceptance is increasing along with the trust in public cloud at large extent. As the security is most vital factor in the cloud. Handovering data to the cloud service provider keeps cloud user tensed. Different threats have been discovered in recent years. Database security in public cloud raised some critical issues for cloud service provider. This rapid adaptation to the clouds, have increased concerns on a critical issue for successive growth of communication technology and information security. From a cloud security perspective, a number of unexplored risks and challenges are faced by cloud because of migration, causing degradation of the effectiveness of traditional protection mechanisms. Keywords: Cloud computing, Cloud DBaaS, public cloud, Cloud Security, Confidentiality, Trust, Encryption.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Security & privacy issues of cloud & grid computing networksijcsa
Cloud computing is a new field in Internet computing that provides novel perspectives in internetworking
technologies. Cloud computing has become a significant technology in field of information technology.
Security of confidential data is a very important area of concern as it can make way for very big problems
if unauthorized users get access to it. Cloud computing should have proper techniques where data is
segregated properly for data security and confidentiality. This paper strives to compare and contrast cloud
computing with grid computing, along with the Tools and simulation environment & Tips to store data and
files safely in Cloud.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Cloud Computing is a versatile technology that can support a broad-spectrum of applications. The low cost of cloud computing and its dynamic scaling renders it an innovation driver for small companies, particularly in the developing world. Cloud deployed enterprise resource planning (ERP), supply chain management applications (SCM), customer relationship management (CRM) applications, medical applications and mobile applications have potential to reach millions of users. In this paper, we explore the different concepts involved in cloud computing. Leveraging our experiences on various clouds, we examine clouds from technical, and service aspects. We highlight some of the opportunities in cloud computing, underlining the importance of clouds and showing why that technology must succeed. Finally, we discuss some of the issues that this area should deal with. The paper aims to provide a means of understanding the model and exploring options available for complementing your technology and infrastructure needs.
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...Sushil kumar Choudhary
Cloud computing is a network-based environment that focuses on sharing computations, Cloud computing networks access to a shared pool of configurable networks, servers, storage, service, applications & other important Computing resources. In modern era of Information Technology, the accesses to all information about the important activities of the related fields. In this paper discuss the advantages, disadvantages, characteristics, challenge, deployment model, cloud service model, cloud service provider & various applications areas of cloud computing such as small & large scale (manufacturing, automation, television, broadcast, constructions industries), Geographical Information system (GIS), Military intelligence fusion (MIS), business management, banking, Education, healthcare, Agriculture sector, E-Governance, project planning, cloud computing in family etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Swiftly increasing demand of computational
calculations in the process of business, transferring of files
under certain protocols and data centers force to develop an
emerging technology cater to the services for computational
need, highly manageable and secure storage. To fulfill these
technological desires cloud computing is the best answer by
introducing various sorts of service platforms in high
computational environment. Cloud computing is the most
recent paradigm promising to turn around the vision of
“computing utilities” into reality. The term “cloud
computing” is relatively new, there is no universal agreement
on this definition. In this paper, we go through with different
area of expertise of research and novelty in cloud computing
domain and its usefulness in the genre of management. Even
though the cloud computing provides many distinguished
features, it still has certain sorts of short comings amidst with
comparatively high cost for both private and public clouds. It
is the way of congregating amasses of information and
resources stored in personal computers and other gadgets
and further putting them on the public cloud for serving
users. Resource management in a cloud environment is a
hard problem, due to the scale of modern data centers, their
interdependencies along with the range of objectives of the
different actors in a cloud ecosystem. Cloud computing is
turning to be one of the most explosively expanding
technologies in the computing industry in this era. It
authorizes the users to transfer their data and computation to
remote location with minimal impact on system performance.
With the evolution of virtualization technology, cloud
computing has been emerged to be distributed systematically
or strategically on full basis. The idea of cloud computing has
not only restored the field of distributed systems but also
fundamentally changed how business utilizes computing
today. Resource management in cloud computing is in fact a
typical problem which is due to the scale of modern data
centers, the variety of resource types and their inter
dependencies, unpredictability of load along with the range of
objectives of the different actors in a cloud ecosystem.
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...IJRES Journal
Mobile cloud computing in light of the increasing popularity among users of mobile smart
technology which is the next indispensable that enables users to take advantage of the storage cloud computing
services. However, mobile cloud computing, the migration of information on the cloud is reliable their privacy
and security issues. Moreover, mobile cloud computing has limitations in resources such as power energy,
processor, Memory and storage. In this paper, we propose a solution to the problem of privacy with saving and
reducing resources power energy, processor and Memory. This is done through data encryption in the mobile
cloud computing by symmetric algorithm and sent to the private cloud and then the data is encrypted again and
sent to the public cloud through Asymmetric algorithm. The experimental results showed after a comparison
between encryption algorithms less time and less time to decryption are as follows: Blowfish algorithm for
symmetric and the DSA algorithm for Asymmetric. The analysis results showed a significant improvement in
reducing the resources in the period of time and power energy consumption and processor.
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
Cloud computing provides the facility to access shared resources and common support which contributes services on
demand over the network to perform operations that meet changing business needs. A cloud storage system, consisting of a collection
of storage servers, affords long-term storage services over the internet. Storing the data in a third party cloud system cause serious
concern over data confidentiality, without considering the local infrastructure limitations, the cloud services allow the user to enjoy the
cloud applications. As the different users may be working in the collaborative relationship, the data sharing becomes significant to
achieve productive benefit during the data accessing. The existing security system only focuses on the authentication; it shows that
user’s private data cannot be accessed by the fake users. To address the above cloud storage privacy issue shared authority based
privacy-preserving authentication protocol is used. In the SAPA, the shared access authority is achieved by anonymous access request
and privacy consideration, attribute based access control allows the user to access their own data fields. To provide the data sharing
among the multiple users proxy re-encryption scheme is applied by the cloud server. The privacy-preserving data access authority
sharing is attractive for multi-user collaborative cloud applications.
Cloud Computing is utility software that has the ability to change the software company and making the software more attractive. Cloud Computing has altered the way IT world used to design software and hardware. The rise in web traffic and different services are increasing day by day making load balancing a big research topic. Cloud computing is technology which uses virtual machine as an alternative of physical machine to host, store and network the different components of computing. Load balancers are used for distributing loads to different virtual machines as an alternative of real machines in such a way that none of the machines gets burdened heavily or lightly. The load balancing needs to be done appropriately because disappointment in any one of the node can lead to inaccessibility of data.
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
in cloud computing data storage is a significant issue
because the entire data reside over a set of interconnected
resource pools that enables the data to be accessed through
virtual machines. It moves the application software’s and
databases to the large data centers where the management of
data is actually done. As the resource pools are situated over
various corners of the world, the management of data and
services may not be fully trustworthy. So, there are various
issues that need to be addressed with respect to the
management of data, service of data, privacy of data, security
of data etc. But the privacy and security of data is highly
challenging. To ensure privacy and security of data-at-rest in
cloud computing, we have proposed an effective and a novel
approach to ensure data security in cloud computing by means
of hiding data within images following is the concept of
steganography. The main objective of this paper is to prevent
data access from cloud data storage centers by unauthorized
users. This scheme perfectly stores data at cloud data storage
centers and retrieves data from it when it is needed.
A predictive model for mapping crime using big data analyticseSAT Journals
Abstract Crime reduction and prevention challenges in today’s world are becoming increasingly complex and are in need of a new technique that can handle the vast amount of information that is being generated. Traditional police capabilities mostly fall short in depicting the original division of criminal activities, thus contribute less in the suitable allocation of police services. In this paper methods are described for crime event forecasting, using Hadoop, by studying the geographical areas which are at greater risk and outside the traditional policing limits. The developed method makes the use of a geographical crime mapping algorithm to identify areas that have relatively high cases of crime. The term used for such places is hot spots. The identified hotspot clusters give valuable data that can be used to train the artificial neural network which further can model the trends of crime. The artificial neural network specification and estimation approach is enhanced by processing capability of Hadoop platform. Keywords— Crime forecasting; Cluster analysis; artificial neural networks; Patrolling; Big data; Hadoop; Gamma test.
Analysis of transient enclosure voltages in gis (emtp simulation studies)eSAT Journals
Abstract Transient Enclosure voltage is special case of very fast transient overvoltages which occurs due to disconnect switch operation or earth ground. Transient Enclosure Voltage appears on external of earthed enclosure of Gas Insulated Systems. Despite of proper grounding, this phenomenon indicates presence of high potentials on Gas Insulted System enclosures so the grounding system impedance is thoroughly examined and designed. In this study EMTP Software is used for analysis. Simulation was done by varying the different parameters. Variations of waveforms of the Transient Enclosure Voltage with various parameters have been studied. Index Terms: Transient Enclosure Voltage (TEV), Gas Insulated System (GIS), Very Fast Transient Overvoltages (VFTO) Transient Ground Potential Rise (TGPR), Disconnector Switch
High speed tree-based 64-bit cmos binary comparatoreSAT Journals
Abstract A high-speed tree-based 64-bit CMOS binary comparator is proposed in this brief. Comparison is most basic arithmetic operation that determines if one number is greater than, equal to, or less than the other number. Comparator is most fundamental component that performs comparison operation. This brief presents comparison of modified and existing 64-bit binary comparator designs concentrating on delay. Means some modifications are done in existing 64-bit binary comparator design to improve the speed of the circuit. Comparison between modified and existing 64-bit binary comparator designs is calculated by simulation that is performed at 90nm technology in Tanner EDA Tool. Index Terms: Binary comparator, digital arithmetic, high-speed
Cimahi river benchmarking flood analysis based on threshold of total rainfalleSAT Journals
Abstract
Flood in Cimahi city coming from the overflow of Cimahi river is a disaster that often occur in the middle Cimahi and extends
downstream region namely Bandung Regency which is still included in the Cimahi Watershed. Flood in Cimahi can earlier be
estimated when the design intensity of rainfall determined and calculate the flow of the river from upstream to downstream.The
purpose of this study was to determine total rainfall that caused the peak river discharge of Cimahi river in upper and middle
cross section and could easily received. The method used in this study is an early warning flood with benchmarking discharge
based on rainfall-runoff models in the Cimahi watershed derived from unit hydrograph synthetic Nakayasu of Cimahi river. The
results obtained from this study is the peak discharge of the Cimahi river upstream at Q= 1.41 m3 / s and in the middle of the
cross section of Q = 2.12 m3 / s. Based on the measurements obtained bankfull discharge Cimahi river upstream cross section of
191.8 m3 / s and bankfull discharge in the middle cross section is 556.26m3 / s. With the drainage coefficient of Cimahi city based
on land use obtained 0,57, then obtained a threshold total rainfall causes of flooding in the upper and middle is respectively as
high as 239 mm and 460 mm. Threshold of Rainfall, bankfull discharge and Cimahi river cross section in this research
integrated on the map namely Benchmarking Flood Diagram of Cimahi City that can be published to stakeholders and the public.
Keywords: bankfull discharge, benchmarking flood diagram, hydrograph, peak discharge,threshold of rainfall
Dft based individual extraction of steganographic compression of imageseSAT Journals
Abstract A Novel scheme of Separable Extraction of concealed data and compressed image is proposed adopting a transform based compression over the encrypted data. Reversible data hiding is branched under Steganography. In this reversible data hiding the art of concealing a secret data over the cover image is practiced. More than that, the main ingredients that play the key role are encryption key and the data hiding key, the compression is performed in between the two processes i.e., encryption and data hiding, to create a spare space to accommodate the secret data. The main aim of this proposed scheme is to limit the distortion and to enhance a wide space for concealing of the secret data i.e., to increase the embedding rate. The compression here classified into lossy and lossless. Lossy compression best suits for image and audio (telephone conversation, etc.) whereas lossless compression needed in the text and videos. Hence to perform the lossless compression over a stegomized image and improve its secrecy, DFT is performed after Encryption. Keywords: DFT, Data Embedding, RDH, Separable RDH, Compression
A traditional computing environment requires a costly
infrastructure to offer a better service to users. The introduction
of cloud computing has changed the working environment from
traditional to virtual. A larger number of IT companies are
utilizing the cloud. On the one hand, the cloud attracts more
number of consumers by offering services with minimized
capital cost and virtual infrastructure. On the other hand, there
are a risk and security challenges in cloud computing that
makes the user not to move completely towards it. The cloud
environment is more vulnerable to security breaches and data
theft. Moreover, insider attacks are more frequent in larger
enterprises. An unauthenticated user can cause more damage
to company reputation. The cloud service providers are trying
to provide a secure work environment for users. However,
there is a lack of global standards and policies to invoke
security measures in cloud computing. This study aims to
highlight and classify security challenges and trust issues in the
cloud environment.
The survey was conducted in various institutions and
governmental organizations in Saudi Arabia to study the
opinions of stakeholders on cloud computing security
challenges and risks.
Links:
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...iosrjce
Cloud computing is an important transition that makes change in service oriented computing
technology. Cloud service provider follows pay-as-you-go pricing approach which means consumer uses as
many resources as he need and billed by the provider based on the resource consumed. CSP give a quality of
service in the form of a service level agreement. For transparent billing, each billing transaction should be
protected against forgery and false modifications. Although CSPs provide service billing records, they cannot
provide trustworthiness. It is due to user or CSP can modify the billing records. In this case even a third party
cannot confirm that the user’s record is correct or CSPs record is correct. To overcome these limitations we
introduced a secure billing system called THEMIS. For secure billing system THEMIS introduces a concept of
cloud notary authority (CNA). CNA generates mutually verifiable binding information that can be used to
resolve future disputes between user and CSP. This project will produce the secure billing through monitoring
the service level agreement (SLA) by using the SMon module. CNA can get a service logs from SMon and stored
it in a local repository for further reference. Even administrator of a cloud system cannot modify or falsify the
data.
Services, security challenges and security policies in cloud computingeSAT Journals
Abstract Cloud computing is becoming most emerging trend in IT industry. With its potential growth and lucrative services cloud computing has acquired mass market in the industry large enterprises running their business on the cloud. A greater acceptance of public cloud by various businesses has given it a wide popularity, strengthening of public cloud security is big milestone. The public cloud acceptance is increasing along with the trust in public cloud at large extent. As the security is most vital factor in the cloud. Handovering data to the cloud service provider keeps cloud user tensed. Different threats have been discovered in recent years. Database security in public cloud raised some critical issues for cloud service provider. This rapid adaptation to the clouds, have increased concerns on a critical issue for successive growth of communication technology and information security. From a cloud security perspective, a number of unexplored risks and challenges are faced by cloud because of migration, causing degradation of the effectiveness of traditional protection mechanisms. Keywords: Cloud computing, Cloud DBaaS, public cloud, Cloud Security, Confidentiality, Trust, Encryption.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Security & privacy issues of cloud & grid computing networksijcsa
Cloud computing is a new field in Internet computing that provides novel perspectives in internetworking
technologies. Cloud computing has become a significant technology in field of information technology.
Security of confidential data is a very important area of concern as it can make way for very big problems
if unauthorized users get access to it. Cloud computing should have proper techniques where data is
segregated properly for data security and confidentiality. This paper strives to compare and contrast cloud
computing with grid computing, along with the Tools and simulation environment & Tips to store data and
files safely in Cloud.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Cloud Computing is a versatile technology that can support a broad-spectrum of applications. The low cost of cloud computing and its dynamic scaling renders it an innovation driver for small companies, particularly in the developing world. Cloud deployed enterprise resource planning (ERP), supply chain management applications (SCM), customer relationship management (CRM) applications, medical applications and mobile applications have potential to reach millions of users. In this paper, we explore the different concepts involved in cloud computing. Leveraging our experiences on various clouds, we examine clouds from technical, and service aspects. We highlight some of the opportunities in cloud computing, underlining the importance of clouds and showing why that technology must succeed. Finally, we discuss some of the issues that this area should deal with. The paper aims to provide a means of understanding the model and exploring options available for complementing your technology and infrastructure needs.
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...Sushil kumar Choudhary
Cloud computing is a network-based environment that focuses on sharing computations, Cloud computing networks access to a shared pool of configurable networks, servers, storage, service, applications & other important Computing resources. In modern era of Information Technology, the accesses to all information about the important activities of the related fields. In this paper discuss the advantages, disadvantages, characteristics, challenge, deployment model, cloud service model, cloud service provider & various applications areas of cloud computing such as small & large scale (manufacturing, automation, television, broadcast, constructions industries), Geographical Information system (GIS), Military intelligence fusion (MIS), business management, banking, Education, healthcare, Agriculture sector, E-Governance, project planning, cloud computing in family etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Swiftly increasing demand of computational
calculations in the process of business, transferring of files
under certain protocols and data centers force to develop an
emerging technology cater to the services for computational
need, highly manageable and secure storage. To fulfill these
technological desires cloud computing is the best answer by
introducing various sorts of service platforms in high
computational environment. Cloud computing is the most
recent paradigm promising to turn around the vision of
“computing utilities” into reality. The term “cloud
computing” is relatively new, there is no universal agreement
on this definition. In this paper, we go through with different
area of expertise of research and novelty in cloud computing
domain and its usefulness in the genre of management. Even
though the cloud computing provides many distinguished
features, it still has certain sorts of short comings amidst with
comparatively high cost for both private and public clouds. It
is the way of congregating amasses of information and
resources stored in personal computers and other gadgets
and further putting them on the public cloud for serving
users. Resource management in a cloud environment is a
hard problem, due to the scale of modern data centers, their
interdependencies along with the range of objectives of the
different actors in a cloud ecosystem. Cloud computing is
turning to be one of the most explosively expanding
technologies in the computing industry in this era. It
authorizes the users to transfer their data and computation to
remote location with minimal impact on system performance.
With the evolution of virtualization technology, cloud
computing has been emerged to be distributed systematically
or strategically on full basis. The idea of cloud computing has
not only restored the field of distributed systems but also
fundamentally changed how business utilizes computing
today. Resource management in cloud computing is in fact a
typical problem which is due to the scale of modern data
centers, the variety of resource types and their inter
dependencies, unpredictability of load along with the range of
objectives of the different actors in a cloud ecosystem.
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...IJRES Journal
Mobile cloud computing in light of the increasing popularity among users of mobile smart
technology which is the next indispensable that enables users to take advantage of the storage cloud computing
services. However, mobile cloud computing, the migration of information on the cloud is reliable their privacy
and security issues. Moreover, mobile cloud computing has limitations in resources such as power energy,
processor, Memory and storage. In this paper, we propose a solution to the problem of privacy with saving and
reducing resources power energy, processor and Memory. This is done through data encryption in the mobile
cloud computing by symmetric algorithm and sent to the private cloud and then the data is encrypted again and
sent to the public cloud through Asymmetric algorithm. The experimental results showed after a comparison
between encryption algorithms less time and less time to decryption are as follows: Blowfish algorithm for
symmetric and the DSA algorithm for Asymmetric. The analysis results showed a significant improvement in
reducing the resources in the period of time and power energy consumption and processor.
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
Cloud computing provides the facility to access shared resources and common support which contributes services on
demand over the network to perform operations that meet changing business needs. A cloud storage system, consisting of a collection
of storage servers, affords long-term storage services over the internet. Storing the data in a third party cloud system cause serious
concern over data confidentiality, without considering the local infrastructure limitations, the cloud services allow the user to enjoy the
cloud applications. As the different users may be working in the collaborative relationship, the data sharing becomes significant to
achieve productive benefit during the data accessing. The existing security system only focuses on the authentication; it shows that
user’s private data cannot be accessed by the fake users. To address the above cloud storage privacy issue shared authority based
privacy-preserving authentication protocol is used. In the SAPA, the shared access authority is achieved by anonymous access request
and privacy consideration, attribute based access control allows the user to access their own data fields. To provide the data sharing
among the multiple users proxy re-encryption scheme is applied by the cloud server. The privacy-preserving data access authority
sharing is attractive for multi-user collaborative cloud applications.
Cloud Computing is utility software that has the ability to change the software company and making the software more attractive. Cloud Computing has altered the way IT world used to design software and hardware. The rise in web traffic and different services are increasing day by day making load balancing a big research topic. Cloud computing is technology which uses virtual machine as an alternative of physical machine to host, store and network the different components of computing. Load balancers are used for distributing loads to different virtual machines as an alternative of real machines in such a way that none of the machines gets burdened heavily or lightly. The load balancing needs to be done appropriately because disappointment in any one of the node can lead to inaccessibility of data.
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
in cloud computing data storage is a significant issue
because the entire data reside over a set of interconnected
resource pools that enables the data to be accessed through
virtual machines. It moves the application software’s and
databases to the large data centers where the management of
data is actually done. As the resource pools are situated over
various corners of the world, the management of data and
services may not be fully trustworthy. So, there are various
issues that need to be addressed with respect to the
management of data, service of data, privacy of data, security
of data etc. But the privacy and security of data is highly
challenging. To ensure privacy and security of data-at-rest in
cloud computing, we have proposed an effective and a novel
approach to ensure data security in cloud computing by means
of hiding data within images following is the concept of
steganography. The main objective of this paper is to prevent
data access from cloud data storage centers by unauthorized
users. This scheme perfectly stores data at cloud data storage
centers and retrieves data from it when it is needed.
A predictive model for mapping crime using big data analyticseSAT Journals
Abstract Crime reduction and prevention challenges in today’s world are becoming increasingly complex and are in need of a new technique that can handle the vast amount of information that is being generated. Traditional police capabilities mostly fall short in depicting the original division of criminal activities, thus contribute less in the suitable allocation of police services. In this paper methods are described for crime event forecasting, using Hadoop, by studying the geographical areas which are at greater risk and outside the traditional policing limits. The developed method makes the use of a geographical crime mapping algorithm to identify areas that have relatively high cases of crime. The term used for such places is hot spots. The identified hotspot clusters give valuable data that can be used to train the artificial neural network which further can model the trends of crime. The artificial neural network specification and estimation approach is enhanced by processing capability of Hadoop platform. Keywords— Crime forecasting; Cluster analysis; artificial neural networks; Patrolling; Big data; Hadoop; Gamma test.
Analysis of transient enclosure voltages in gis (emtp simulation studies)eSAT Journals
Abstract Transient Enclosure voltage is special case of very fast transient overvoltages which occurs due to disconnect switch operation or earth ground. Transient Enclosure Voltage appears on external of earthed enclosure of Gas Insulated Systems. Despite of proper grounding, this phenomenon indicates presence of high potentials on Gas Insulted System enclosures so the grounding system impedance is thoroughly examined and designed. In this study EMTP Software is used for analysis. Simulation was done by varying the different parameters. Variations of waveforms of the Transient Enclosure Voltage with various parameters have been studied. Index Terms: Transient Enclosure Voltage (TEV), Gas Insulated System (GIS), Very Fast Transient Overvoltages (VFTO) Transient Ground Potential Rise (TGPR), Disconnector Switch
High speed tree-based 64-bit cmos binary comparatoreSAT Journals
Abstract A high-speed tree-based 64-bit CMOS binary comparator is proposed in this brief. Comparison is most basic arithmetic operation that determines if one number is greater than, equal to, or less than the other number. Comparator is most fundamental component that performs comparison operation. This brief presents comparison of modified and existing 64-bit binary comparator designs concentrating on delay. Means some modifications are done in existing 64-bit binary comparator design to improve the speed of the circuit. Comparison between modified and existing 64-bit binary comparator designs is calculated by simulation that is performed at 90nm technology in Tanner EDA Tool. Index Terms: Binary comparator, digital arithmetic, high-speed
Cimahi river benchmarking flood analysis based on threshold of total rainfalleSAT Journals
Abstract
Flood in Cimahi city coming from the overflow of Cimahi river is a disaster that often occur in the middle Cimahi and extends
downstream region namely Bandung Regency which is still included in the Cimahi Watershed. Flood in Cimahi can earlier be
estimated when the design intensity of rainfall determined and calculate the flow of the river from upstream to downstream.The
purpose of this study was to determine total rainfall that caused the peak river discharge of Cimahi river in upper and middle
cross section and could easily received. The method used in this study is an early warning flood with benchmarking discharge
based on rainfall-runoff models in the Cimahi watershed derived from unit hydrograph synthetic Nakayasu of Cimahi river. The
results obtained from this study is the peak discharge of the Cimahi river upstream at Q= 1.41 m3 / s and in the middle of the
cross section of Q = 2.12 m3 / s. Based on the measurements obtained bankfull discharge Cimahi river upstream cross section of
191.8 m3 / s and bankfull discharge in the middle cross section is 556.26m3 / s. With the drainage coefficient of Cimahi city based
on land use obtained 0,57, then obtained a threshold total rainfall causes of flooding in the upper and middle is respectively as
high as 239 mm and 460 mm. Threshold of Rainfall, bankfull discharge and Cimahi river cross section in this research
integrated on the map namely Benchmarking Flood Diagram of Cimahi City that can be published to stakeholders and the public.
Keywords: bankfull discharge, benchmarking flood diagram, hydrograph, peak discharge,threshold of rainfall
Dft based individual extraction of steganographic compression of imageseSAT Journals
Abstract A Novel scheme of Separable Extraction of concealed data and compressed image is proposed adopting a transform based compression over the encrypted data. Reversible data hiding is branched under Steganography. In this reversible data hiding the art of concealing a secret data over the cover image is practiced. More than that, the main ingredients that play the key role are encryption key and the data hiding key, the compression is performed in between the two processes i.e., encryption and data hiding, to create a spare space to accommodate the secret data. The main aim of this proposed scheme is to limit the distortion and to enhance a wide space for concealing of the secret data i.e., to increase the embedding rate. The compression here classified into lossy and lossless. Lossy compression best suits for image and audio (telephone conversation, etc.) whereas lossless compression needed in the text and videos. Hence to perform the lossless compression over a stegomized image and improve its secrecy, DFT is performed after Encryption. Keywords: DFT, Data Embedding, RDH, Separable RDH, Compression
A comparative study of physical attacks on wireless sensor networkseSAT Journals
Abstract Wireless Sensor Networks (WSN) have many potential applications and challenges They consists of hundreds or thousands of low power, low cost sensor nodes which have limited computing resources. WSNs are susceptible to many types of physical attacks due to wireless and shared nature of communication channel, un-trusted transmissions, deployment in open environments, unattended nature and limited resources. So security is a vital requirement for these networks. However wireless micro-sensor networks pose numerous design challenges. This challenge is especially difficult due to the energy constrained nature of the devices. In this paper we focus a wide variety of physical attacks and a comparison on them which enable s us to identify the purpose and capabilities of the attackers. Also this paper discusses known approaches of security detection and defensive mechanisms against the physical attacks effectively. Keywords- Communication channel, Open environment, Physical attacks, Sensor nodes, Wireless Sensor Networks,
Experimental investigation of chemical etching on different materials using n...eSAT Journals
Abstract In this paper, the experimental work is done on different materials EN5 Steel and EN32 steel. Chemical etching technique is used for this purpose. These both materials are used for the low pressure dies or plastic dies. For the preparing of these dies the complex parts of dies are to be prepared by chemical etching technique. During the machining with chemical etching technique the overcut area of material is caused. In this experimentation minimum overcut area is concluded for best machining. Analysis of variance (ANOVA) is employed to investigate the influence of time, temperature and concentration on minimum overcut area of the material. The experiments was conducted to varying the parameters of etching process like temperature from 180c to 220c, Time from 2 hrs to 6 hrs and concentration 8% to 12% are studied in details according to Taguchi's design of experiments. At last results are analyzed using Taguchi, ANOVA and parametric optimization is done for minimum overcut area of material. From the experimentation, it is concluded that for etching of EN5 steel and EN32 steel, optimum machining condition for minimum overcut area with Time (2hrs), Temperature (180c), and Concentration (8%). Keywords: ANOVA, OVERCUT AREA, TAGUCHI, ETCHING, EN5 STEEL, EN32 STEEL
Energy saving opportunities in oxygen plant a case studyeSAT Journals
Abstract
Energy saving is the one of the step of the energy management. The energy management is play vital role in the industrial as well as domestic sector. The energy management concept was developed in USA and US since 1973, while in India and most Asian countries this concept was adopted in 1990 and later. The wastage reduction should include energy efficiency drives using improved designs and devices. The modification in components of the plant to increasing efficiency which is improved cycle performance. This Paper presented survey of energy end use in cryogenic-industries, such as OXYGEN MANUFACTURING INDUSTRIES. The energy required for the production of liquid and gaseous phase of oxygen. We had carried out energy saving opportunity in oxygen plant and find the energy saving opportunities in various components of oxygen plant. This paper discussed the various parameters for the energy saving in the plant components. We find opportunities of energy saving in plant with some modification and calculate the actual power required in plant equipments. Keywords : Energy saving , oxygen plant
I v characteristics and transconductance modeling for dual channel algangan m...eSAT Journals
Abstract This paper presents the design and practical implementation of a Boost-type power converter for Photovoltaic (PV) system for energy storage application based on Perturb and Observe Maximum Power Point Tracking (MPPT) algorithm. A Boost converter is used to regulate battery charging. The major drawbacks faced by the tracking algorithm in the conventional method of tracking is overcome by the strategic utilization of a properly controlled and programmed design of Peripheral Interface Controller which helps in achieving optimized output results of MPPT algorithm.. The system is controlled by a Peripheral Interface Controller (PIC) 16F877 controller by sensing the solar panel voltage and generating the Pulse Width Modulation (PWM) signal to control duty cycle of the boost converter. This type of microcontroller was chosen is best suited as it has the necessary features for the proposed design such as built-in Analog-to-Digital Converter (ADC), PWM outputs, low power consumption and low cost. Hardware results demonstrate the effectiveness and validity of the proposed system in order to attain satisfactory results from the method. This paper mainly focuses on the effective utilization of PIC controller in the implementation of the MPPT algorithm and its constructional features which help gain the appropriate and accurate results. Keywords: Photovoltaic system, Analog-to-Digital Converter, Peripheral Interface Controller, Maximum Power Point Tracking, Pulse Width Modulation, Boost-type power converter, Duty Cycle.
Synthesis of methyl, benzyl and pseudo halogeno co (iii) complexes of a dioxi...eSAT Journals
Abstract In view of the importance of the macrocyclic chemistry, the Cobalt (II) complexes of several new categories of azamacrocycles were synthesized. Here we describes a new quadridentate ligand 5,6-Benzo(15-crown-5)4,7-diaza deca-2,9-ethanedial dioxime (C18H24N4O7).This chelate coordinates with cobalt in the equatorial position as a monoanion leaving the axial sites vacant for coordination by a variety of monodentate ligands, thereby paving the way for the synthesis of pseudo halogeno and alkyl Co(III) complexes. The macrocyclic ligands and their complexes have been characterized by elemental analysis, molecular weight determination, conductance, IR and NMR spectral studies. The spectral data suggested tetra coordinated state for cobalt, its geometry is tetrahedral. Conductivity data suggests that they behave as electrolytes. The formulation of the complexes has been established on the basis of chemical composition. Further analysis for C, H, and N and may be required for complete description of the complexes. The ligand and their complexes have been used as catalyst in many industries. Keywords: Cobalt, Macrocyclic complex, synthesis, spectroscopy
Uv radiation assisted photocatalytic transformation of azo dye direct yellow 9eSAT Journals
Abstract
Advanced oxidation process (AOP) is best for treatment of textile industries effluents (waste water). Methylene blue immobilized resin dowex-11; a photocatalyst is used for transformation of azo dyes. The mechanism of the photo transformation depends on the radiation used. Activity of catalyst remains unaffected on continuous use. The process follows pseudo first order kinetics according to Langmuir Hinshelwood model, the value of rate constant k is 1.43*10-2 min-1 and approximately 94.60% of the dye was transforms within 160 min of irradiation.
Keywords: Transformation, Direct Yellow-9, Methylene blue immobilized resin, Textile effluents; Dowex-11, Photocatalyst.
An adaptive gmm approach to background subtraction for application in real ti...eSAT Journals
Abstract Efficient security management has become an important parameter in today’s world. As the problem is growing, there is an urgent need for the introduction of advanced technology and equipment to improve the state-of art of surveillance. In this paper we propose a model for real time background subtraction using AGMM. The proposed model is robust and adaptable to dynamic background, fast illumination changes, repetitive motion. Also we have incorporated a method for detecting shadows using the Horpresert color model. The proposed model can be employed for monitoring areas where movement or entry is highly restricted. So on detection of any unexpected events in the scene an alarm can be triggered and hence we can achieve real time surveillance even in the absence of constant human monitoring. Keywords-Background subtraction, Adaptive Gaussian Mixture model (AGMM), surveillance, Horpresert color model.
Fault model analysis by parasitic extraction method for embedded srameSAT Journals
Abstract Fault analysis plays a significant role in developing detailed fault models for subsequent diagnostics and debugging of a semiconductor memory product. Existing fault models were analyzed in terms of well known March algorithms. Such analysis is able to give information only on either detection of fault or correction. But they are failing to give information based on various constraints such as dynamic power analysis, propagation delay analysis, and the bit line capacitance influence while reading or writing the data. Scale down in technology causes changes in parasitic effects, which may cause additional source of faulty behavior. Hence we suggest an analysis which includes majority of these constraints with the help of layout based fault model. Finally different parametric values are compared for faulty and fault free SRAM cell. We found that although some of the defects can be mapped to existing fault models, there are many defects that result in undefined fault models. Keywords: fault models, March algorithms, dynamic power analysis, propagation delay analysis, bit line capacitance, layout based fault model, undefined fault models.
Finger vein based biometric security systemeSAT Journals
Abstract Finger vein recognition is a kind of biometric authentication system. This is one among many forms of biometrics used to recognize the individuals and to verify their identity. This paper presents a finger vein authentication system using template matching. Implementation using Matlab shows that the finger vein authentication system performs well for user identification. Keywords – biometric, feature extraction, figure vein, security system
Development of a hands free urinal flushing systemeSAT Journals
Abstract In this paper an automatic urinal flushing system that ensures hands free flushing and conservation of water is proposed. Use is made of a delta DVP-I4SS2 programmable logic controller (PLC), limit switch and a solenoid valve to achieve the hardware design. A limit switch is actuated the moment a user steps on a standing pad placed at the front of the urinal thereby turning on the PLC input. The PLC uses this information to give an output command to actuate a solenoid valve to flush the urinal. Ladder control program was developed for the hardware control using WPLSoft software. Programming and testing of control program with the proposed system suggested that the system can be easily implemented at public places, banks, schools, restaurants and bus stop terminals at an estimated cost of US $ 202. Key Words: Flush, PLC, Limit switch, solenoid valve, WPLSoft, DVP-14SS2
Removal of arsenic (v) from water by adsorption onto low cost and waste mater...eSAT Journals
Abstract In the present study, waste and low-cost materials like Cast-Iron Filings (wastes from mechanical workshops, lathes) and Steel Wool (commercially available, used for cleaning of wood surfaces prior to polishing) were investigated to assess their potential for removal of Arsenic from water by the process of adsorption by conducting different types of batch adsorption experiments, continuous flow column studies and candle filter studies. Batch sorption experiments brought forth the effectiveness of sorbent materials for removal of Arsenic from water achieving a removal of 90-95% at favorable pH conditions which lie in the normal range. Isothermal equilibrium data fitted well into the Langmuir model suggesting formation of unimolecular monolayer of sorbate over a homogenous surface of uniform energy. Both desorption studies and the shape of the saturation curves denote high affinity of the sorbent for the sorbate. Regeneration studies indicate repeated regeneration of the sorbents thus extending the usage of the sorbent following regenerations. While sulfates, Fluoride and chlorides have little influence on sorptive removal, phosphates and silicates exercise considerable influence by reducing removal. Fixed bed continuous down-flow column studies conducted using ground water spiked with 300ug/l Arsenic (V) at flow rates of 5.0 and 10.0 ml/min indicated the usefulness of the sorbents for engineering applications for removal of Arsenic from water. Candle filter studies conducted by filling the hollow portion of the candles used in the domestic filters filled with sorbent material further demonstrated the utility of the existing household filters for removal of Arsenic (V) to less than the permissible limits of BIS/WHO by simply filling the hollow portion with the sorbent material. No leaching of Iron was found in the filtered water. Key words: Arsenic, water, removal, adsorption, cast iron filings, steel wool, household filter.
Analysis of rc bridge decks for selected national a nd internationalstandard ...eSAT Journals
Abstract
The paper presents the comparison of the effect of different standard loadings on a set of reinforced concrete bridge decks using the
finite-element method. The parameters investigated include the aspect ratio (span/width) and type of loading. The investigations are
conducted on two lane slab bridge decks of span 5m to 9.5m and two lane T beam bridge decks of span 7.5m to 20m. A total of 36
bridge models were analyzed. The variation of different critical structural response parameters such as deflection, longitudinal
bending moment, transverse moment, shear force and torsional moments are evaluated for IRC loading (IRC Class A and 70R
loadings), AASHTO loading (HL93) and Euro standard loading (LM1). The results shows that the maximum difference in deflection
and longitudinal bending moment for the two IRC standard loading ranges from 5 to 15%. While the difference between
corresponding values for the AASHTO loading in the range of 5 to 17%. The maximum axle load of euro standard loading is found to
be 2.2 times higher than IRC class A loading maximum axle load hence the values of structural response parameters are increased by
1.7 to 1.8 times. Therefore there is a need for adopting simplified and more realistic standard loads in the future.
Keywords: Bridges, Concrete deck slabs; Finite element method; T-beam bridge decks; Aspect ratio; Live load, IRC code,
AASHTO code and Euro code.
Stabilization of soft soil with granulated blast furnace slag and fly asheSAT Journals
Abstract Utilization of industrial waste materials in the improvement of problematic soils is a cost efficient and environmental friendly method. It helps in reducing disposal problems caused by the various industrial wastes. However, it is essential to understand the performance of these waste products prior to use. The present paper evaluated the potential of granulated blast furnace slag (GBS) with fly ash to stabilize a soft soil. Soft soil samples were collected from Tatibandh-Atari, rural road of Raipur, Chhattisgarh. This soil was classified as CI-MI as per Indian Standard Classification system (ISCS). Different amounts of GBS, i.e. 3, 6, and 9% with different amount of fly ash i.e 3%, 6%, 9% and 12% were used to stabilize the soft soil. The performance of GBS with fly ash modified soils was evaluated using compaction and california bearing ratio (CBR) test. Based on these performance tests, optimum amount of GBS with fly ash was determined as 3% fly ash + 6% GBS. Reasonable improvement has been observed for unsoaked and soaked CBR value of soils with this optimum amount. Index Terms: Granulated blast furnace slag, soft soil, fly ash, CBR, Compaction
Service oriented cloud architecture for improved performance of smart grid ap...eSAT Journals
Abstract An effective and flexible computational platform is needed for the data coordination and processing associated with real time operational and application services in smart grid. A server environment where multiple applications are hosted by a common pool of virtualized server resources demands an open source structure for ensuring operational flexibility. In this paper, open source architecture is proposed for real time services which involve data coordination and processing. The architecture enables secure and reliable exchange of information and transactions with users over the internet to support various services. Prioritizing the applications based on complexity enhances efficiency of resource allocation in such situations. A priority based scheduling algorithm is proposed in the work for application level performance management in the structure. Analytical model based on queuing theory is developed for evaluating the performance of the test bed. The implementation is done using open stack cloud and the test results show a significant gain of 8% with the algorithm. Index Terms: Service Oriented Architecture, Smart grid, Mean response time, Open stack, Queuing model
An Efficient MDC based Set Partitioned Embedded Block Image CodingDr. Amarjeet Singh
In this paper, fast, efficient, simple and widely used
Set Partitioned Embedded bloCK based coding is done on
Multiple Descriptions of transformed image. The maximum
potential of this type of coding can be exploited with discrete
wavelet transform (DWT) of images. Two correlated
descriptions are generated from a wavelet transformed image
to ensure meaningful transmission of the image over noise
prone wireless channels. These correlated descriptions are
encoded by set partitioning technique through SPECK coders
and transmitted over wireless channels. Quality of
reconstructed image at the decoder side depends upon the
number of descriptions received. More the number of
descriptions received at output side, more enhance the quality
of reconstructed image. However, if any of the multiple
description is lost, the receive can estimate it exploiting the
correlation between the descriptions. The simulations
performed on an image on MATLAB gives decent
performance and results even after half of the descriptions is
lost in transmission.
In this paper we are study-ing about cloud computing, their types, need to use cloud computing. We also study the architecture of the mobile cloud computing. So we included new techniques for backup and restoring data from mobile to cloud. Here we proposed to apply some compres-sion technique while backup and restore data from Smartphone to cloud and cloud to the Smartphone.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Now a days the work is being done by hiring the space and resources from the cloud providers in order to do work effectively and less costly. This paper describes the cloud, its challenges, evolution, attacks along with the approaches required to handle data on cloud. The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. The need of this review paper is to provide the awareness of the current emerging technology which saves the cost of users.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
Cloud computing provides the facility to access shared resources and common support which contributes services on demand over the network to perform operations that meet changing business needs. A cloud storage system, consisting of a collection of storage servers, affords long-term storage services over the internet. Storing the data in a third party cloud system cause serious concern over data confidentiality, without considering the local infrastructure limitations, the cloud services allow the user to enjoy the cloud applications. As the different users may be working in the collaborative relationship, the data sharing becomes significant to achieve productive benefit during the data accessing. The existing security system only focuses on the authentication; it shows that user’s private data cannot be accessed by the fake users. To address the above cloud storage privacy issue shared authority based privacy-preserving authentication protocol is used. In the SAPA, the shared access authority is achieved by anonymous access request and privacy consideration, attribute based access control allows the user to access their own data fields. To provide the data sharing among the multiple users proxy re-encryption scheme is applied by the cloud server. The privacy-preserving data access authority sharing is attractive for multi-user collaborative cloud applications.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Cloud computing is Internet based development and use of computer technology. It is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or control over the technology infrastructure "in the cloud" that supports them. Cloud computing is a hot topic all over the world nowadays, through which customers can access information and computer power via a web browser. As the adoption and deployment of cloud computing increase, it is critical to evaluate the performance of cloud environments. Currently, modeling and simulation technology has become a useful and powerful tool in cloud computing research community to deal with these issues. Cloud simulators are required for cloud system testing to decrease the complexity and separate quality concerns. Cloud computing means saving and accessing the data over the internet instead of local storage. In this paper, we have provided a short review on the types, models and architecture of the cloud environment.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Software as a service for efficient cloud computingeSAT Journals
Abstract This Research paper explores importance of Software As A Service (SaaS) for efficient cloud computing in organizations and its implications. Enterprises now a days are betting big on SaaS and integrating this service delivery model of cloud computing architecture in their IT services. SaaS applications are service centric cloud computing delivery model used as IT Infrastructure which is multi-tenant architecture used to provide rich user experience with desired set of features requested by the cloud user. This research paper also discusses the importance of SaaS application architecture, functionality, efficiency, advantages and disadvantages. Keywords: Cloud Computing, Service Delivery Models, Software as a Service, SaaS Architecture.
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
Abstract
The effect of addition of mono fibers and hybrid fibers on the mechanical properties of concrete mixture is studied in the present
investigation. Steel fibers of 1% and polypropylene fibers 0.036% were added individually to the concrete mixture as mono fibers and
then they were added together to form a hybrid fiber reinforced concrete. Mechanical properties such as compressive, split tensile and
flexural strength were determined. The results show that hybrid fibers improve the compressive strength marginally as compared to
mono fibers. Whereas, hybridization improves split tensile strength and flexural strength noticeably.
Keywords:-Hybridization, mono fibers, steel fiber, polypropylene fiber, Improvement in mechanical properties.
Material management in construction – a case studyeSAT Journals
Abstract
The objective of the present study is to understand about all the problems occurring in the company because of improper application
of material management. In construction project operation, often there is a project cost variance in terms of the material, equipments,
manpower, subcontractor, overhead cost, and general condition. Material is the main component in construction projects. Therefore,
if the material management is not properly managed it will create a project cost variance. Project cost can be controlled by taking
corrective actions towards the cost variance. Therefore a methodology is used to diagnose and evaluate the procurement process
involved in material management and launch a continuous improvement was developed and applied. A thorough study was carried
out along with study of cases, surveys and interviews to professionals involved in this area. As a result, a methodology for diagnosis
and improvement was proposed and tested in selected projects. The results obtained show that the main problem of procurement is
related to schedule delays and lack of specified quality for the project. To prevent this situation it is often necessary to dedicate
important resources like money, personnel, time, etc. To monitor and control the process. A great potential for improvement was
detected if state of the art technologies such as, electronic mail, electronic data interchange (EDI), and analysis were applied to the
procurement process. These helped to eliminate the root causes for many types of problems that were detected.
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
Abstract
Drought management needs multidisciplinary action. Interdisciplinary efforts among the experts in various fields of the droughts
prone areas are helpful to achieve tangible and permanent solution for this recurring problem. The Gulbarga district having the total
area around 16, 240 sq.km, and accounts 8.45 per cent of the Karnataka state area. The district has been situated with latitude 17º 19'
60" North and longitude of 76 º 49' 60" east. The district is situated entirely on the Deccan plateau positioned at a height of 300 to
750 m above MSL. Sub-tropical, semi-arid type is one among the drought prone districts of Karnataka State. The drought
management is very important for a district like Gulbarga. In this paper various short term strategies are discussed to mitigate the
drought condition in the district.
Keywords: Drought, South-West monsoon, Semi-Arid, Rainfall, Strategies etc.
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
Abstract
Pavements are subjected to severe condition of stresses and weathering effects from the day they are constructed and opened to traffic
mainly due to its fatigue behavior and environmental effects. Therefore, pavement rehabilitation is one of the most important
components of entire road systems. This paper highlights the design of concrete pavement with added mono fibers like polypropylene,
steel and hybrid fibres for a widened portion of existing concrete pavement and various overlay alternatives for an existing
bituminous pavement in an urban road in Bangalore. Along with this, Life cycle cost analyses at these sections are done by Net
Present Value (NPV) method to identify the most feasible option. The results show that though the initial cost of construction of
concrete overlay is high, over a period of time it prove to be better than the bituminous overlay considering the whole life cycle cost.
The economic analysis also indicates that, out of the three fibre options, hybrid reinforced concrete would be economical without
compromising the performance of the pavement.
Keywords: - Fatigue, Life cycle cost analysis, Net Present Value method, Overlay, Rehabilitation
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
Abstract
The issue of growing demand on our nation’s roadways over that past couple of decades, decreasing budgetary funds, and the need to
provide a safe, efficient, and cost effective roadway system has led to a dramatic increase in the need to rehabilitate our existing
pavements and the issue of building sustainable road infrastructure in India. With these emergency of the mentioned needs and this
are today’s burning issue and has become the purpose of the study.
In the present study, the samples of existing bituminous layer materials were collected from NH-48(Devahalli to Hassan) site.The
mixtures were designed by Marshall Method as per Asphalt institute (MS-II) at 20% and 30% Reclaimed Asphalt Pavement (RAP).
RAP material was blended with virgin aggregate such that all specimens tested for the, Dense Bituminous Macadam-II (DBM-II)
gradation as per Ministry of Roads, Transport, and Highways (MoRT&H) and cost analysis were carried out to know the economics.
Laboratory results and analysis showed the use of recycled materials showed significant variability in Marshall Stability, and the
variability increased with the increase in RAP content. The saving can be realized from utilization of recycled materials as per the
methodology, the reduction in the total cost is 19%, 30%, comparing with the virgin mixes.
Keywords: Reclaimed Asphalt Pavement, Marshall Stability, MS-II, Dense Bituminous Macadam-II
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
Abstract
Soil stabilization has proven to be one of the oldest techniques to improve the soil properties. Literature review conducted revealed
that uses of natural inorganic stabilizers are found to be one of the best options for soil stabilization. In this regard an attempt has
been made to evaluate the influence of RBI-81 stabilizer on properties of black cotton soil through laboratory investigations. Black
cotton soil with varying percentages of RBI-81 viz., 0, 0.5, 1, 1.5, 2, and 2.5 percent were studied for moisture density relationships
and strength behaviour of soils. Also the effect of curing period was evaluated as literature review clearly emphasized the strength
gain of soils stabilized with RBI-81 over a period of time. The results obtained shows that the unconfined compressive strength of
specimens treated with RBI-81 increased approximately by 250% for a curing period of 28 days as compared to virgin soil. Further
the CBR value improved approximately by 400%. The studies indicated an increasing trend for soil strength behaviour with
increasing percentage of RBI-81 suggesting its potential applications in soil stabilization.
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
Abstract
Reinforced masonry was developed to exploit the strength potential of masonry and to solve its lack of tensile strength. Experimental
and analytical studies have been carried out to investigate the effect of reinforcement on the behavior of hollow concrete block
masonry prisms under compression and to predict ultimate failure compressive strength. In the numerical program, three dimensional
non-linear finite elements (FE) model based on the micro-modeling approach is developed for both unreinforced and reinforced
masonry prisms using ANSYS (14.5). The proposed FE model uses multi-linear stress-strain relationships to model the non-linear
behavior of hollow concrete block, mortar, and grout. Willam-Warnke’s five parameter failure theory has been adopted to model the
failure of masonry materials. The comparison of the numerical and experimental results indicates that the FE models can successfully
capture the highly nonlinear behavior of the physical specimens and accurately predict their strength and failure mechanisms.
Keywords: Structural masonry, Hollow concrete block prism, grout, Compression failure, Finite element method,
Numerical modeling.
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
Abstract
Increase in traffic along with heavier magnitude of wheel loads cause rapid deterioration in pavements. There is a need to improve
density, strength of soil subgrade and other pavement layers. In this study an attempt is made to improve the properties of locally
available loamy soil using twin approaches viz., i) increasing the compaction of soil and ii) treating the soil with chemical stabilizer.
Laboratory studies are carried out on both untreated and treated soil samples compacted by different compaction efforts. Studies
show that increase in compaction effort results in increase in density of soil. However in soil treated with chemical stabilizer, rate of
increase in density is not significant. The soil treated with chemical stabilizer exhibits improvement in both strength and performance
properties.
Keywords: compaction, density, subgradestabilization, resilient modulus
Geographical information system (gis) for water resources managementeSAT Journals
Abstract
Water resources projects are inherited with overlapping and at times conflicting objectives. These projects are often of varied sizes
ranging from major projects with command areas of millions of hectares to very small projects implemented at the local level. Thus,
in all these projects there is seldom proper coordination which is essential for ensuring collective sustainability.
Integrated watershed development and management is the accepted answer but in turn requires a comprehensive framework that can
enable planning process involving all the stakeholders at different levels and scales is compulsory. Such a unified hydrological
framework is essential to evaluate the cause and effect of all the proposed actions within the drainage basins.
The present paper describes a hydrological framework developed in the form of a Hydrologic Information System (HIS) which is
intended to meet the specific information needs of the various line departments of a typical State connected with water related aspects.
The HIS consist of a hydrologic information database coupled with tools for collating primary and secondary data and tools for
analyzing and visualizing the data and information. The HIS also incorporates hydrological model base for indirect assessment of
various entities of water balance in space and time. The framework would be maintained and updated to reflect fully the most
accurate ground truth data and the infrastructure requirements for planning and management.
Keywords: Hydrological Information System (HIS); WebGIS; Data Model; Web Mapping Services
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
Abstract
The study demonstrate the potentiality of satellite remote sensing technique for the generation of baseline information on forest types
including tree plantation details in Bidar forest division, Karnataka covering an area of 5814.60Sq.Kms. The Total Area of Bidar
forest division is 5814Sq.Kms analysis of the satellite data in the study area reveals that about 84% of the total area is Covered by
crop land, 1.778% of the area is covered by dry deciduous forest, 1.38 % of mixed plantation, which is very threatening to the
environmental stability of the forest, future plantation site has been mapped. With the use of latest Geo-informatics technology proper
and exact condition of the trees can be observed and necessary precautions can be taken for future plantation works in an appropriate
manner
Keywords:-RS, GIS, GPS, Forest Type, Tree Plantation
Factors influencing compressive strength of geopolymer concreteeSAT Journals
Abstract
To study effects of several factors on the properties of fly ash based geopolymer concrete on the compressive strength and also the
cost comparison with the normal concrete. The test variables were molarities of sodium hydroxide(NaOH) 8M,14M and 16M, ratio of
NaOH to sodium silicate (Na2SiO3) 1, 1.5, 2 and 2.5, alkaline liquid to fly ash ratio 0.35 and 0.40 and replacement of water in
Na2SiO3 solution by 10%, 20% and 30% were used in the present study. The test results indicated that the highest compressive
strength 54 MPa was observed for 16M of NaOH, ratio of NaOH to Na2SiO3 2.5 and alkaline liquid to fly ash ratio of 0.35. Lowest
compressive strength of 27 MPa was observed for 8M of NaOH, ratio of NaOH to Na2SiO3 is 1 and alkaline liquid to fly ash ratio of
0.40. Alkaline liquid to fly ash ratio of 0.35, water replacement of 10% and 30% for 8 and 16 molarity of NaOH and has resulted in
compressive strength of 36 MPa and 20 MPa respectively. Superplasticiser dosage of 2 % by weight of fly ash has given higher
strength in all cases.
Keywords: compressive strength, alkaline liquid, fly ash
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
Abstract
Composite Circular hollow Steel tubes with and without GFRP infill for three different grades of Light weight concrete are tested for
ultimate load capacity and axial shortening , under Cyclic loading. Steel tubes are compared for different lengths, cross sections and
thickness. Specimens were tested separately after adopting Taguchi’s L9 (Latin Squares) Orthogonal array in order to save the initial
experimental cost on number of specimens and experimental duration. Analysis was carried out using ANN (Artificial Neural
Network) technique with the assistance of Mini Tab- a statistical soft tool. Comparison for predicted, experimental & ANN output is
obtained from linear regression plots. From this research study, it can be concluded that *Cross sectional area of steel tube has most
significant effect on ultimate load carrying capacity, *as length of steel tube increased- load carrying capacity decreased & *ANN
modeling predicted acceptable results. Thus ANN tool can be utilized for predicting ultimate load carrying capacity for composite
columns.
Keywords: Light weight concrete, GFRP, Artificial Neural Network, Linear Regression, Back propagation, orthogonal
Array, Latin Squares
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
Abstract
This paper presents an outlook on experimental behavior and a comparison with predicted formula on the behaviour of circular
concentrically loaded self-consolidating fibre reinforced concrete filled steel tube columns (HSSCFRC). Forty-five specimens were
tested. The main parameters varied in the tests are: (1) percentage of fiber (2) tube diameter or width to wall thickness ratio (D/t
from 15 to 25) (3) L/d ratio from 2.97 to 7.04 the results from these predictions were compared with the experimental data. The
experimental results) were also validated in this study.
Keywords: Self-compacting concrete; Concrete-filled steel tube; axial load behavior; Ultimate capacity.
Evaluation of punching shear in flat slabseSAT Journals
Abstract
Flat-slab construction has been widely used in construction today because of many advantages that it offers. The basic philosophy in
the design of flat slab is to consider only gravity forces; this method ignores the effect of punching shear due to unbalanced moments
at the slab column junction which is critical. An attempt has been made to generate generalized design sheets which accounts both
punching shear due to gravity loads and unbalanced moments for cases (a) interior column; (b) edge column (bending perpendicular
to shorter edge); (c) edge column (bending parallel to shorter edge); (d) corner column. These design sheets are prepared as per
codal provisions of IS 456-2000. These design sheets will be helpful in calculating the shear reinforcement to be provided at the
critical section which is ignored in many design offices. Apart from its usefulness in evaluating punching shear and the necessary
shear reinforcement, the design sheets developed will enable the designer to fix the depth of flat slab during the initial phase of the
design.
Keywords: Flat slabs, punching shear, unbalanced moment.
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
Abstract
Intake towers are typically tall, hollow, reinforced concrete structures and form entrance to reservoir outlet works. A parametric
study on dynamic behavior of circular cylindrical towers can be carried out to study the effect of depth of submergence, wall thickness
and slenderness ratio, and also effect on tower considering dynamic analysis for time history function of different soil condition and
by Goyal and Chopra accounting interaction effects of added hydrodynamic mass of surrounding and inside water in intake tower of
dam
Key words: Hydrodynamic mass, Depth of submergence, Reservoir, Time history analysis,
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
Abstract
Efficiency of the road network system is analyzed by travel time reliability measures. The study overlooks on an important measure of
travel time reliability and prioritizing Tiruchirappalli road network. Traffic volume and travel time were collected using license plate
matching method. Travel time measures were estimated from average travel time and 95th travel time. Effect of non-motorized vehicle
on efficiency of road system was evaluated. Relation between buffer time index and traffic volume was created. Travel time model has
been developed and travel time measure was validated. Then service quality of road sections in network were graded based on
travel time reliability measures.
Keywords: Buffer Time Index (BTI); Average Travel Time (ATT); Travel Time Reliability (TTR); Buffer Time (BT).
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
Abstract
The development of watershed aims at productive utilization of all the available natural resources in the entire area extending from
ridge line to stream outlet. The per capita availability of land for cultivation has been decreasing over the years. Therefore, water and
the related land resources must be developed, utilized and managed in an integrated and comprehensive manner. Remote sensing and
GIS techniques are being increasingly used for planning, management and development of natural resources. The study area, Nallur
Amanikere watershed geographically lies between 110 38’ and 110 52’ N latitude and 760 30’ and 760 50’ E longitude with an area of
415.68 Sq. km. The thematic layers such as land use/land cover and soil maps were derived from remotely sensed data and overlayed
through ArcGIS software to assign the curve number on polygon wise. The daily rainfall data of six rain gauge stations in and around
the watershed (2001-2011) was used to estimate the daily runoff from the watershed using Soil Conservation Service - Curve Number
(SCS-CN) method. The runoff estimated from the SCS-CN model was then used to know the variation of runoff potential with different
land use/land cover and with different soil conditions.
Keywords: Watershed, Nallur watershed, Surface runoff, Rainfall-Runoff, SCS-CN, Remote Sensing, GIS.
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
Abstract
Land and water are the two vital natural resources, the optimal management of these resources with minimum adverse environmental
impact are essential not only for sustainable development but also for human survival. Satellite remote sensing with geographic
information system has a pragmatic approach to map and generate spatial input layers of predicting response behavior and yield of
watershed. Hence, in the present study an attempt has been made to understand the hydrological process of the catchment at the
watershed level by drawing the inferences from moprhometric analysis and runoff. The study area chosen for the present study is
Yagachi catchment situated in Chickamaglur and Hassan district lies geographically at a longitude 75⁰52’08.77”E and
13⁰10’50.77”N latitude. It covers an area of 559.493 Sq.km. Morphometric analysis is carried out to estimate morphometric
parameters at Micro-watershed to understand the hydrological response of the catchment at the Micro-watershed level. Daily runoff
is estimated using USDA SCS curve number model for a period of 10 years from 2001 to 2010. The rainfall runoff relationship of the
study shows there is a positive correlation.
Keywords: morphometric analysis, runoff, remote sensing and GIS, SCS - method
-
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
Abstract The nonlinear Static procedure also well known as pushover analysis is method where in monotonically increasing loads are applied to the structure till the structure is unable to resist any further load. It is a popular tool for seismic performance evaluation of existing and new structures. In literature lot of research has been carried out on conventional pushover analysis and after knowing deficiency efforts have been made to improve it. But actual test results to verify the analytically obtained pushover results are rarely available. It has been found that some amount of variation is always expected to exist in seismic demand prediction of pushover analysis. Initial study is carried out by considering user defined hinge properties and default hinge length. Attempt is being made to assess the variation of pushover analysis results by considering user defined hinge properties and various hinge length formulations available in literature and results compared with experimentally obtained results based on test carried out on a G+2 storied RCC framed structure. For the present study two geometric models viz bare frame and rigid frame model is considered and it is found that the results of pushover analysis are very sensitive to geometric model and hinge length adopted. Keywords: Pushover analysis, Base shear, Displacement, hinge length, moment curvature analysis
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
Abstract
Depletion of natural resources and aggregate quarries for the road construction is a serious problem to procure materials. Hence
recycling or reuse of material is beneficial. On emphasizing development in sustainable construction in the present era, recycling of
asphalt pavements is one of the effective and proven rehabilitation processes. For the laboratory investigations reclaimed asphalt
pavement (RAP) from NH-4 and crumb rubber modified binder (CRMB-55) was used. Foundry waste was used as a replacement to
conventional filler. Laboratory tests were conducted on asphalt concrete mixes with 30, 40, 50, and 60 percent replacement with RAP.
These test results were compared with conventional mixes and asphalt concrete mixes with complete binder extracted RAP
aggregates. Mix design was carried out by Marshall Method. The Marshall Tests indicated highest stability values for asphalt
concrete (AC) mixes with 60% RAP. The optimum binder content (OBC) decreased with increased in RAP in AC mixes. The Indirect
Tensile Strength (ITS) for AC mixes with RAP also was found to be higher when compared to conventional AC mixes at 300C.
Keywords: Reclaimed asphalt pavement, Foundry waste, Recycling, Marshall Stability, Indirect tensile strength.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
1. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 02 | Feb-2013, Available @ http://www.ijret.org 126
ADDRESSING THE CLOUD COMPUTING SECURITY MENACE
Abha Thakral Sachdev1
, Mohit Bhansali2
1
Assistant Professor,2
Student, Department of Computer Science and Engineering, Amity University, Noida, India,
aabhathakral@yahoo.co.in, mohitbhansali@outlook.com
Abstract
Cloud Computing is fast gaining popularity today with its scalable, flexible and on-demand service provision. It brings cost saving
and agility to organization with pay-as-you-go approach. Abundant resources are available and the user has a huge range to select
from. Cloud facilitates virtualization, simplification, automation and accelerated delivery of application and services for a sustainable
business advantage. As much as the technological benefit, cloud computing also has security issues. Security in cloud computing is
essential for providing quality of service. In this paper we address security issues which concern cloud computing environment today.
We analyze Cloud Computing and security menace it faces due to different threats.
Index Terms: Cloud Computing, Cloud Service Provider (CSP), Cloud Security, Cloud User, SaaS, PaaS, IaaS, StaaS
-----------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
Cloud Computing is the future generation in computation. It is
a trope for the Internet. In Cloud Computing, all information,
application and resources are handled in a virtual environment.
It brings an open, standards-based architecture that maintains
user choice and increases business value, substantially
minimizing the managing effort and total cost of ownership.
Cloud Computing involves virtual hosted environments
allowing users to access the services being hosted over the
Internet. It is a mode of computing in which IT-related
potentialities are provided “as a service”. Cloud users can
access technology-enabled services from the Internet without
any prior knowledge of the technology that holds them.
According to Cisco Global Cloud Index, Annual global cloud
IP traffic will reach 4.3 zeta-bytes by the end of 2016. It will
grow at a CAGR of 44 percent from 2011 to 2016 and account
for nearly two-thirds of total data center traffic by 2016 [4].
Examples of Cloud Computing are Microsoft‟s SkyDrive,
Google Drive, dropbox.com, box.com etc. There is no need to
have a server or any software to employ it. Internet connection
is all that is required. The server and email management
software is on the cloud and is totally managed by the cloud
service provider (CSP) like Microsoft, Google, and Amazon
etc. The user gets to use the services and enjoy the benefits.
Cloud clearly has financial and operational benefits, but they
have to be carefully weighed against the contradictory security
concerns.
2. WHY CLOUD COMPUTING
Cloud Computing is more beneficial as compared to
traditional computing. The major cloud providers such as
Microsoft, Google, and Amazon are working on building the
world‟s largest data centers across the Globe. Each data center
includes thousands of computer servers, substation power
transformers and cooling equipment. For example, Microsoft‟s
data center in Quincy, Washington has 43,600 square meters
of space and 965 kilometers of electric wire, uses 4.8
kilometers of chiller piping, 92,900 square meters of drywall
and 1.5 metric tons of backup batteries. The company does not
reveals the number of servers however it says that the data
center consumes 48 megawatts which is adequate to power
40,000 homes [12]. As another example, the National Security
Agency is planning to build a massive data center at Utah
which is expected to take in 70 megawatts electricity.
Hardware has been replaced by environment friendly Cloud
Computing technology which reduces CO2 emissions. It
benefits business through its huge infrastructure, as businesses
do not have to directly implement or administer over it; its
initial cost reduces the overall implementation and
maintenance costs; it has comfort of backup system; it has
mobility of information which can be easily use across globe;
its IT resources enables scalability during the peak time and
according to the needs of the user; its usage further adds to
innovation because of its minimized huge upfront costs for test
and development environments.
3. CHARACTERISTICS OF CLOUD COMPUTING
The important characteristic of Cloud Computing is that it
takes less IT skills for execution.
In Cloud Computing, users access the data, applications
or any other services with the help of a browser regardless
of the device used and the user‟s location. The
infrastructure which is provided by a third-party is
accessed with the aid of internet.
Consistent service can be obtained by the use of various
sites which is appropriate for business continuity and
tragedy healing.
2. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 02 | Feb-2013, Available @ http://www.ijret.org 127
Efficient operation of infrastructure takes place as the
resources and costs are pooled among a large set of users.
Maintenance is easier in case of Cloud Computing
applications as they need not be installed on each user‟s
computer.
Pay per use service allows measuring the usage of
application per cloud user on regular basis. User has to
pay only for the resources he consumes.
Performance can be monitored and thus it is scalable.
Also, it has rapid elasticity i.e. cloud users can increase or
decrease capacity on demand.
4. CLOUD COMPUTING – DEPLOYMENT AND
DELIVERY MODELS
Cloud Computing can be classified and deployed in a number
of ways i.e. public, private or hybrid clouds.
A. Public Cloud
Public Cloud are cloud services provided by third parties and
hosted and managed by the service providers. It is also known
as External Clouds. The cloud providers assume the
responsibilities of installation, management, provisioning and
maintenance. Users access and consume the services and IT
resources. Users are charged only for the resources and
services they use, following a pay-as-you-go approach. Major
drawbacks are lack of appropriate security, reliability and
regulatory compliance. Amazon.com is one of the largest
public cloud providers.
B. Private Cloud
Private Cloud are proprietary networks, often data centres,
residing within the enterprise for the exclusive use of the
organization or for a known group of users. It is also known as
Internal Clouds. A local or private network infrastructure is
employed. Here, the enterprise is in charge of setting up and
maintaining the cloud and thus the enterprise can take better
control of all aspects of the provisioning and functioning. The
added advantage is in terms of better control of security, more
effective regulatory compliance and improved quality of
service. For mission critical processes and for location of
sensitive data, this type of cloud infrastructure provides much
more privacy than a Public Cloud.
Private Clouds are, generally, Clouds that reside within the
organization, however, private clouds, outside the
organization, are also becoming a possibility, where the
resources inside a Cloud are available only to the organization
concerned and totally invisible to others.
When a service provider uses public cloud resources to create
their private cloud, the result is a virtual private cloud. A
Community Cloud is a semi-private cloud that is used by the
defined group of tenants with shared backgrounds and
requirements [2]. This, then, becomes a private cloud for this
community, where the management responsibility is shared
amongst the members of the community.
C. Hybrid Cloud
Hybrid Cloud are a combination of private and public clouds.
Here, the management responsibilities are split between the
enterprise and the public cloud providers, which can often
become an issue of concern. For mission critical processes,
this type of cloud infrastructure can also be highly effective
because of enhanced control and management by the
enterprise itself. For example, the organization can keep the
sensitive data within the private cloud and the rest in the
public cloud.
The Cloud model generally consists of three types of
architecture which provide services, namely: Software
Services, Platform Services, and Infrastructure Services. These
are generally referred as Software-as-a-Service (SaaS),
Platform-as-a-Service (PaaS) and Infrastructure-as-a-Service
(IaaS), respectively [3].
Presenting the model as pyramid, the Software Services will
be at the top and the Infrastructure Services will be the bottom
of the pyramid. Based on this anatomy, the Cloud Services are
often defined, as in the following sections and as shown in
Figure below.
Fig -1: A 3-Layer Model of Cloud Computing
1) Software as a Service (SaaS)
This refers to prebuilt and vertically integrated applications
(e.g. an email system, human resource management, payroll
processing, database processing and other application
processes) that are delivered to and purchased by users as
services. Here, cloud users are looking to purchase
functionality. Applications are normally designed for ease of
use based on proven business models. This may be regarded as
a user level layer and it can be further classified into: 1)
Services (which are often standalone applications e.g. a billing
service); and 2) Applications (which are often units of
functionalities). SaaS is a very broad market where services
can be anything from Web-based email to inventory control,
even in some cases outline banking services, as well as
database processing. Gmail, Hotmail, Quicken Online,
3. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 02 | Feb-2013, Available @ http://www.ijret.org 128
IBM®Websphere, Boomi and SalesForce are some of the
well-known SaaS products and providers.
2) Platform as a Service (PaaS)
This layer refers to software and product development tools
(e.g. application servers, database servers, portal servers,
middleware, etc.) which cloud user purchase so they can build
and deploy their own applications, thus providing a much
increased flexibility and control to the user. However, there
may sometimes be a certain amount of dependence upon the
infrastructure and platform providers. The services, here, are
intended to support the „software services‟ at top layer of the
pyramid. The cloud users are looking to buy time and cost
savings in deploying their applications. Typical offerings
include runtime environment for application code, compute
power, storage, and networking infrastructure. This level of
services may be regarded as a developer level layer. The
pricing structure is often along the lines of: compute usage per
hour; data transfer per GB; I/O requests per million; storage
per GB; data storage requests per thousand etc. All charges are
per each billing period. Google App Engine, Heroku, Mosso
and Engine Yard are examples of PaaS products and
providers.
3) Infrastructure as a Service (IaaS)
This layer is essentially hardware (e.g. visualized servers,
storage, network devices, etc.) and hardware services to enable
Cloud Platforms and Applications to operate. These services
support the „software services‟ at top layer of the pyramid.
Users get full control over server infrastructure and that
sometimes comes with a price premium. Here, users are
looking to buy „computing‟, without making upfront
investment. Since, the infrastructure is offered on a pay-for-
what-you-see basis, it is sometimes referred to as utility
computing, as there is similarity with the provision and use of
services such as electricity and gas. The pricing structure is
often similar to the provision for PaaS. Amazon EC2, IBM
BlueHouse, VMWare, GoGrid, RightScale and Linode are
some of the IaaS products and providers.
4) Storage as a Service (StaaS)
It facilitates cloud applications to scale beyond their limited
servers. StaaS allows users to store their data at remote disks
and access them anytime from any place.
Cloud storage systems are expected to meet several rigorous
requirements for maintaining user‟s data and information,
including high availability, reliability, performance,
replication and data consistency; but because of the conflicting
nature of these requirements, no user implements all of them
together.
5) Other Provisions as a Service
The dividing line between the three layers as shown in Figure
1 is not clear and, in fact there is a considerable amount of
overlap. For example, a software system may be considered as
part of a software platform. It is for this reason that
researchers have also discussed combined models such as:
SaaS & PaaS; SaaS & IaaS; IaaS & PaaS; and even SaaS &
PaaS & IaaS. Numerous other categories have also been
suggested in recent years e.g.:
5.1 Database-as-a-Service
5.2 Security-as-a-Service
5.3 Communication-as-a-Service
5.4 Management/ Governance-as-a-Service
5.5 Integration-as-a-Service
5.6 Testing-as-a-Service
5.7 Business Process-as-a-Service
In this respect, any provision that is available and that
provides support in some sense to the user is regarded as a
„service‟. For an enterprise, it is not enough to have services
available in the Cloud. There is, often, also a requirement of
expertise available to help the enterprise to interface,
sequence, and integrate the services with what already exists.
So, Integration-as-a-Service or „Solution-as-a-Service‟ can be
particularly important service.
5. CLOUD SECURITY
Security concerns, which arise specifically due to
virtualization, are common to all cloud models. As compared
to Private Clouds, Public Clouds have additional security
concerns which demand specific counter measures. This is
because, in a Private Cloud, a cloud user has complete control
over the resources and can enforce security policies. In Public
and Hybrid Clouds, however, cloud users usually do not have
that much control over the resources and therefore,
enforcement of security mechanisms is comparatively difficult
for them. For CSPs also, it is not easy to enforce all the
security measures that meet the security needs of all the users,
because different users may have different security demands
based upon their objective of using the cloud services.
A. Multi Tenancy
Cloud services work on multi-tenancy model where the same
resources are shared by multiple independent cloud users.
Many times this would lead to a situation where competitors
co-exist on the same cloud. Such an environment opens up a
whole lot of possibility of data stealth. So, how can cloud user
place sensitive information like personal details, bank details,
passwords, keys etc. on the cloud?
From a CSP‟s perspective enforcing uniform security
measures and controls is difficult as each user has different
security demands. Each cloud user enters the cloud with its
own objective of using a certain service. From the user‟s
4. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 02 | Feb-2013, Available @ http://www.ijret.org 129
perspective, ensuring security is not possible as he does not
have much access control.
To address this unwanted situation, isolation is a key remedy.
This includes isolation of data, applications and virtual
machines. Also CSP at no juncture should be allowed to make
any changes to the cloud user‟s data.
B. Data Loss and Leakage
Data can be compromised in multiple ways. Access of
sensitive data to unauthorized entities can expose it. Removal
or modification of data without having backup can lead to its
loss. Storage of data on unreliable media can make it
vulnerable to multiple attacks, thereby compromising its
integrity. Also if linked/indexed records are wrongly stored,
blocks of orphan data will be generated. Such a loss leads to
huge brand damage and existing users may also loose trust.
This can lead to financial, legal and competitive implications.
To curb such situations, strong encryption algorithm must be
applied for data in transit. Tough storage management
procedures should be implemented. Stringent access control
mechanism with sensitive data access notifications should be
in place. Also best backup and retention strategies must be
practised.
C. Easy Accessibility of Cloud
Cloud services are open for all to use. A simple registration
model where anybody with a valid credit card can register and
become a cloud user, open a world of opportunity for the wily
minds. The anonymity model can serve as a beacon for
malicious users who freely enter the cloud and can then attack
innocent users. The attacks can range from password and
sensitive data cracking to host overt and covert channels.
Rigorous registration model with stringent processes in place
is required to prevent the occurrence of such attacks. Also
attacking network addresses should be blacklisted and the list
should be made public for others to save themselves from
nefarious attackers.
D. Identity Management
Cloud Computing is uniting of multiple technologies coming
together to satisfy the needs of diversified users through a
labyrinth of services and software‟s. This requires Identity
Management (IDM) for different technologies to inter-operate
and function as a single entity in a shared landscape.
Thereby, IDM in cloud needs to be looked upon with a new
eye, detached from traditional IDM‟s. Its concern areas are
provisioning/de-provisioning, synchronization, entitlement,
lifecycle management etc. Provisioning and de-provisioning
means just-in-time or on-demand provisioning and de-
provisioning. Just-in-time provisioning indicates the
federation of user accounts without sharing prior data, based
on some trust model. Real time de-provisioning of a user
account has to synchronize instantaneously with all
participating service providers.
Identity lifecycle management specifies what personal details
can be edited by the users, their self-service components and
delegation rules. Entitlement specifies access rights of
authenticated security principal. Synchronization smoothens
the movement and growth of Identity Management capabilities
by enabling services that facilitate building of trust [11].
E. Unsafe API’s
Application program interface is a set of routines and
protocols describing how software components will
communicate with each other. API is a user manual. Every
CSP publishes its API for reference of cloud users while they
are deploying their data on cloud. These are not only very
useful from cloud user‟s perspective; but also can act as a
great guiding tool for attackers. The architectural and design
specification details mentioned in the API can be studied by
attackers and then used to formulate shortcomings and flaws;
which can then be exploited. Also, other vendors and third
parties use these interfaces to build their own applications and
provide value-added services to cloud users. This going
further adds to complexity.
To avoid such an attack each API‟s dependency chain should
be analysed. Unknown API dependencies and layering should
be minimised. While designing API‟s, procedures to maintain
confidentiality and integrity of data should be implied.
F. Service Level Agreement
Service Level Agreement is the legal document signed by CSP
and cloud user defining their business relationship. It enlists
the services to be delivered by the CSP, their evaluation
criteria, tracking and compliance of offered services and legal
measures to be taken in case of unsatisfactory performance. It
should specify security mechanisms which will be deployed
for ensuring his privacy; as data being placed in the cloud may
be highly sensitive and of utmost importance to the user.
Specifications of authentication, authorization and audit
controls must be enlisted. Details of logging, patching and
configuration hardening should be given. What level of
recovery and backup will be provided in worst case scenarios
should be given. Also how data will be erased in case of exit
of user from the cloud should be mentioned as improper
disposal may lead to undue exposure and exploitation of data.
G. Patch Management
A patch is a piece of code written to fix bugs, or
update/enhance an existing computer program. This includes
fixing security vulnerabilities and other errors, and improving
its usability and performance. Patch management is the
process of planning which patches should be applied where
5. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 02 | Feb-2013, Available @ http://www.ijret.org 130
and how. It is an ongoing process, and becomes a vicious
circle in case of poorly designed patches as a weak patch can
introduce new bugs. Also, a carefully written patch applied
today can introduce novel vulnerabilities which need to be
addressed tomorrow. This becomes more critical in cloud
environment which is being used 24*7, with no shutdown
time. For example, Dropbox made a code update at 1:54pm
Pacific time on 19th June, 2011, that introduced a bug
affecting their authentication mechanism. Though its fix was
made live after 5 minutes of its detection but still for around 4
hours an account could be opened without correct password
[5]. Such dynamic vulnerability poses serious threat.
With huge number of users and applications residing in the
public cloud, it becomes difficult for the CSP to ensure that all
applications are working correctly after the latest patch update.
So, the responsibility for patch management resides with the
user. Still on CSP‟s end, bidirectional firewalls should be
deployed. Firewalls should cover all IP protocols and network
interfaces.
H. Internal Threats
Internal safe guarding is as important as external security. A
cloud user has placed his confidential data on the cloud, with
little or no control over it. CSP does not display transparency
in term of its processes and procedures about recruiting of
employees and their specialization and skills. Also there is no
way to know what level of access control is given to CSP‟s
employees handling this confidential information. A malicious
mind in disguise of an employee can lead to accessing of
confidential data, stealing it and passing it on to user‟s
competitors. This results in sensitive information for the user
being lost and brand damage for the CSP.
To curb this situation, there should be processes on CSP‟s end
to detect and avoid internal attacks. A thorough and
hierarchical access control mechanism should be applied for
compliance by all the employees. Stronger credentials should
replace usernames and passwords as the foundation of the
access management system [9]. Multi-layer background
check of newly hired employees should be conducted.
CONCLUSIONS
Cloud Computing predictions indicate significant growth in
coming years. The global market for Cloud Computing is
going to increase from about $41 billion in 2011 to $241
billion in 2020 [10]. Security is inevitable in cloud computing,
given that all sensitive information is placed on the cloud by
users. It will become a great business differentiator and the
CSP‟s who provide and prove their secure space will only be
able to flourish. With addressing major menace causing
factors in this research paper, we can expect organizations to
offer safer and secure services. It provides a clear reference for
cloud users to evaluate CSP‟s on the basis of security
provided.
REFERENCES:
[1]. ENISA, Cloud Computing: benefits, risk and
recommendations for information security, [Online]
Available:
http://www.enisa.europa.eu/act/rm/files/deliverables/clo
ud-computing-risk-assessment/at_download/fullReport/
[2]. Google and IBM Announced University Initiative to
Address Internet-Scale Computing Challenges, [Online]
Available: http://www-
03.ibm.com/press/us/en/pressrelease/22414.wss.
[3]. SearchCloudComputing, Definition – Cloud
Computing; [Online] Available:
http://searchcloudcomputing.techtarget.com/definition/c
loud-computing
[4]. Cisco, Cloud Index White Paper, [Online] Available:
http://cisco.com/en/US/solutions/collateral/ns341/ns525
/ns537/ns705/ns1175/Cloud_Index_White_Paper.pdf
[5]. Dropbox Security Bug Made Passwords Optional for
Four Hours (2011). [Online]. Available:
http://techcrunch.com/2011/06/20/dropbox-security-
bug-made-passwords-optional-for-four-hours/
[6]. Srinivasan, Madhan Kumar, et al. "State-of-the-art
cloud computing security taxonomies: a classification
of security challenges in the present cloud computing
environment." Proceedings of the International
Conference on Advances in Computing,
Communications and Informatics. ACM, 2012.
[7]. Cloud Security Alliance, Top Threats to Cloud
Computing V1.0 (2010), [Online]. Available:
http://www.cloudsecurityalliance.org/topthreats/csathre
ats.v.1.0.pdf
[8]. Boampong, Philogene A., and Luay A. Wahsheh.
"Different facets of security in the cloud." Proceedings
of the 15th Communications and Networking
Simulation Symposium. Society for Computer
Simulation International, 2012.
[9]. Roger Halbheer, Chief Security Advisor, Public Sector,
EMEA Doug Cavit, Principal Security Strategist Lead,
Trustworthy Computing USA (2010), Cloud
Computing Security Considerations [Online].
Available: http://www.microsoft.com/en-
us/download/details.aspx?id=1013.
[10]. The Wallstreet Journal, More Predictions on the Huge
Growth of Cloud Computing, [Online]. Available:
http://blogs.wsj.com/digits/2011/04/21/more-
predictions-on-the-huge-growth-of-cloud-computing/
[11]. Gopalakrishnan, Anu. "Cloud computing identity
management." SETLabs briefings 7.7 (2009): 45-54.
[12]. Katz, R.H.; , "Tech Titans Building Boom," Spectrum,
IEEE , vol.46, no.2, pp.40-54, Feb. 2009
[13]. P. Mell and T. Grance, The NIST Definition of Cloud
Computing, National Institute of Standards and
Technology, Information Technology Laboratory,
Technical Report Version 15, 2009.