"Cloud Computing" is a term, which involves virtualization, distributed computing, networking and web-services. It is a way of offering services to users by allowing them to tap into a massive pool of shared computing resources such as servers, storage and network. User can use services by simply plug into the cloud and pay only for what he uses. All these features made a cloud computing very advantageous and demanding. But the data privacy is a key security problem in cloud computing which comprises of data integrity, data confidentiality and user privacy specific concerns. Most of the persons do not prefer cloud to store their data as they are having a fear of losing the privacy of their confidential data. This paper introduces some cloud computing data security problem and its strategy to solve them which also satisfies the user regarding their data security.
Cloud Computing Basics Features and Servicesijtsrd
Cloud computing is an on demand service in which distributed resources, information, software and other devices are provided according to the client's requirement at specific time 1 . Cloud computing involves deploying groups of remote servers and software networks that allow centralized data storage and online access to computer services or resources. In this paper, we explore the different services in different computing platforms and applications. Cloud computing is a service, which offers customers to work over the internet 2 . Kyi Pyar | Me Me Khaing "Cloud Computing Basics: Features and Services" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd27960.pdfPaper URL: https://www.ijtsrd.com/computer-science/distributed-computing/27960/cloud-computing-basics-features-and-services/kyi-pyar
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Cloud computing is very useful then also its own set of cons discourage cloud users to choose them as a best option. The multitenant architecture of cloud exposed to several threats such as improper trust management at service provider site, Storage security, Shared technology vulnerabilities, data lost/leakage during transit, unauthorized access of data. This paper studied review work on cloud steganography.
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...Sushil kumar Choudhary
Cloud computing is a network-based environment that focuses on sharing computations, Cloud computing networks access to a shared pool of configurable networks, servers, storage, service, applications & other important Computing resources. In modern era of Information Technology, the accesses to all information about the important activities of the related fields. In this paper discuss the advantages, disadvantages, characteristics, challenge, deployment model, cloud service model, cloud service provider & various applications areas of cloud computing such as small & large scale (manufacturing, automation, television, broadcast, constructions industries), Geographical Information system (GIS), Military intelligence fusion (MIS), business management, banking, Education, healthcare, Agriculture sector, E-Governance, project planning, cloud computing in family etc.
Cloud Computing Basics Features and Servicesijtsrd
Cloud computing is an on demand service in which distributed resources, information, software and other devices are provided according to the client's requirement at specific time 1 . Cloud computing involves deploying groups of remote servers and software networks that allow centralized data storage and online access to computer services or resources. In this paper, we explore the different services in different computing platforms and applications. Cloud computing is a service, which offers customers to work over the internet 2 . Kyi Pyar | Me Me Khaing "Cloud Computing Basics: Features and Services" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd27960.pdfPaper URL: https://www.ijtsrd.com/computer-science/distributed-computing/27960/cloud-computing-basics-features-and-services/kyi-pyar
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Cloud computing is very useful then also its own set of cons discourage cloud users to choose them as a best option. The multitenant architecture of cloud exposed to several threats such as improper trust management at service provider site, Storage security, Shared technology vulnerabilities, data lost/leakage during transit, unauthorized access of data. This paper studied review work on cloud steganography.
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...Sushil kumar Choudhary
Cloud computing is a network-based environment that focuses on sharing computations, Cloud computing networks access to a shared pool of configurable networks, servers, storage, service, applications & other important Computing resources. In modern era of Information Technology, the accesses to all information about the important activities of the related fields. In this paper discuss the advantages, disadvantages, characteristics, challenge, deployment model, cloud service model, cloud service provider & various applications areas of cloud computing such as small & large scale (manufacturing, automation, television, broadcast, constructions industries), Geographical Information system (GIS), Military intelligence fusion (MIS), business management, banking, Education, healthcare, Agriculture sector, E-Governance, project planning, cloud computing in family etc.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Abstract--The paper identifies the issues and the solution to overcome these problems. Cloud computing is a subscription based service where we can obtain networked storage space and computer resources. This technology has the capacity to admittance a common collection of resources on request. It is the application provided in the form of service over the internet and system hardware in the data centers that gives these services. But having many advantages for IT organizations cloud has some issues that must be consider during its deployment. The main concern is security privacy and trust. There are various issues that need to be dealt with respect to security and privacy in a cloud computing scenario [4].
Keywords--Cloud, Issues, Security, Privacy, Resources, Technology.
From the server room to the board room, there is a lot of talk about “the cloud” — and for good reason. The cloud offers organizations — and their information technology (IT) staffs, in particular — a number of important benefits ranging from increased efficiencies to scalability. Taking advantage of these benefits requires understanding the various cloud models available and how they can best meet your organization’s specific needs.
Review on Security Techniques using Cloud ComputingEditor IJCATR
Cloud Computing is the nascent technology which is based on Pay-Per-Use Model. Cloud computing is emerging as a
model of “Everything as a Service” (XaaS). Cloud Computing is computing paradigm where applications, data bandwidth and IT
services are provided over the Internet. Cloud Computing is a relatively new computing model that provides on demand business
and IT services over the Internet. The main concerns in adapting Cloud Computing is its security, different security risks that
affects the cloud environment in the area of confidentiality, Integrity and computing on data is thoroughly investigated
This presentation attempts to first demystify what's Cloud, and why Cloud Computing is an absolute MUST to reduce Cost of Application Delivery. It then attempts to bring out the important role that DCIM will play in the Cloud Computing Infrastructure, as we head towards a world of Software Defined Data Centers.
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
The Most great challenging in Cloud computing is Security. Here Security plays key role
in this paper proposed concept mainly deals with security at the end user access. While coming to the
end user access that are connected through the public networks. Here the end user wants to access his
application or services protected by the unauthorized persons. In this area if we want to apply
encryption or decryption methods such as RSA, 3DES, MD5, Blow fish. Etc.,
Whereas we can utilize these services at the end user access in cloud computing. Here there is
problem of encryption and decryption of the messages, services and applications. They are is lot of
time to take encrypt as well as decrypt and more number of processing capabilities are needed to use
the mechanism. For that problem we are introducing to use of cloud computing in SaaS model. i.e.,
scalable is applicable in this area so whenever it requires we can utilize the SaaS model.
In Cloud computing use of computing resources (hardware and software) that are delivered as a
service over Internet network. In advance earlier there is problem of using key size in various
algorithm like 64 bit it take some long period to encrypt the data.
I want to thank everyone who attended this presentation at AFCOM Data Center World Fall 2011 in Orlando, FL.
Studies show the number of data centers deploying virtual cloud computing will rapidly increase in the next five years. Other studies show that the number of Internet attacks and their level of sophistication will also grow significantly. This session identifies approaches to reduce the risk of business disruptions resulting from inadequate virtual security controls in a data center. It will cover utilizing best practices for security configurations, measuring information security status, and making rational decisions about security investments.
Connect with me if you have any questions or need additional information.
Please favorite this if you like it. I look forward to seeing you again soon.
Regards,
Hector Del Castillo
http://linkd.in/hdelcastillo
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Cloud Computing is a versatile technology that can support a broad-spectrum of applications. The low cost of cloud computing and its dynamic scaling renders it an innovation driver for small companies, particularly in the developing world. Cloud deployed enterprise resource planning (ERP), supply chain management applications (SCM), customer relationship management (CRM) applications, medical applications and mobile applications have potential to reach millions of users. In this paper, we explore the different concepts involved in cloud computing. Leveraging our experiences on various clouds, we examine clouds from technical, and service aspects. We highlight some of the opportunities in cloud computing, underlining the importance of clouds and showing why that technology must succeed. Finally, we discuss some of the issues that this area should deal with. The paper aims to provide a means of understanding the model and exploring options available for complementing your technology and infrastructure needs.
Cloud deployment models: public, private, hybrid, community – Categories of cloud computing: Everything as a service: Infrastructure, platform, software - Pros and Cons of cloud computing – Implementation levels of virtualization – virtualization structure – virtualization of CPU, Memory and I/O devices – virtual clusters and Resource Management – Virtualization for data center automation.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Abstract--The paper identifies the issues and the solution to overcome these problems. Cloud computing is a subscription based service where we can obtain networked storage space and computer resources. This technology has the capacity to admittance a common collection of resources on request. It is the application provided in the form of service over the internet and system hardware in the data centers that gives these services. But having many advantages for IT organizations cloud has some issues that must be consider during its deployment. The main concern is security privacy and trust. There are various issues that need to be dealt with respect to security and privacy in a cloud computing scenario [4].
Keywords--Cloud, Issues, Security, Privacy, Resources, Technology.
From the server room to the board room, there is a lot of talk about “the cloud” — and for good reason. The cloud offers organizations — and their information technology (IT) staffs, in particular — a number of important benefits ranging from increased efficiencies to scalability. Taking advantage of these benefits requires understanding the various cloud models available and how they can best meet your organization’s specific needs.
Review on Security Techniques using Cloud ComputingEditor IJCATR
Cloud Computing is the nascent technology which is based on Pay-Per-Use Model. Cloud computing is emerging as a
model of “Everything as a Service” (XaaS). Cloud Computing is computing paradigm where applications, data bandwidth and IT
services are provided over the Internet. Cloud Computing is a relatively new computing model that provides on demand business
and IT services over the Internet. The main concerns in adapting Cloud Computing is its security, different security risks that
affects the cloud environment in the area of confidentiality, Integrity and computing on data is thoroughly investigated
This presentation attempts to first demystify what's Cloud, and why Cloud Computing is an absolute MUST to reduce Cost of Application Delivery. It then attempts to bring out the important role that DCIM will play in the Cloud Computing Infrastructure, as we head towards a world of Software Defined Data Centers.
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
The Most great challenging in Cloud computing is Security. Here Security plays key role
in this paper proposed concept mainly deals with security at the end user access. While coming to the
end user access that are connected through the public networks. Here the end user wants to access his
application or services protected by the unauthorized persons. In this area if we want to apply
encryption or decryption methods such as RSA, 3DES, MD5, Blow fish. Etc.,
Whereas we can utilize these services at the end user access in cloud computing. Here there is
problem of encryption and decryption of the messages, services and applications. They are is lot of
time to take encrypt as well as decrypt and more number of processing capabilities are needed to use
the mechanism. For that problem we are introducing to use of cloud computing in SaaS model. i.e.,
scalable is applicable in this area so whenever it requires we can utilize the SaaS model.
In Cloud computing use of computing resources (hardware and software) that are delivered as a
service over Internet network. In advance earlier there is problem of using key size in various
algorithm like 64 bit it take some long period to encrypt the data.
I want to thank everyone who attended this presentation at AFCOM Data Center World Fall 2011 in Orlando, FL.
Studies show the number of data centers deploying virtual cloud computing will rapidly increase in the next five years. Other studies show that the number of Internet attacks and their level of sophistication will also grow significantly. This session identifies approaches to reduce the risk of business disruptions resulting from inadequate virtual security controls in a data center. It will cover utilizing best practices for security configurations, measuring information security status, and making rational decisions about security investments.
Connect with me if you have any questions or need additional information.
Please favorite this if you like it. I look forward to seeing you again soon.
Regards,
Hector Del Castillo
http://linkd.in/hdelcastillo
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Cloud Computing is a versatile technology that can support a broad-spectrum of applications. The low cost of cloud computing and its dynamic scaling renders it an innovation driver for small companies, particularly in the developing world. Cloud deployed enterprise resource planning (ERP), supply chain management applications (SCM), customer relationship management (CRM) applications, medical applications and mobile applications have potential to reach millions of users. In this paper, we explore the different concepts involved in cloud computing. Leveraging our experiences on various clouds, we examine clouds from technical, and service aspects. We highlight some of the opportunities in cloud computing, underlining the importance of clouds and showing why that technology must succeed. Finally, we discuss some of the issues that this area should deal with. The paper aims to provide a means of understanding the model and exploring options available for complementing your technology and infrastructure needs.
Cloud deployment models: public, private, hybrid, community – Categories of cloud computing: Everything as a service: Infrastructure, platform, software - Pros and Cons of cloud computing – Implementation levels of virtualization – virtualization structure – virtualization of CPU, Memory and I/O devices – virtual clusters and Resource Management – Virtualization for data center automation.
Understanding the cloud computing stackSatish Chavan
Understanding the cloud computing stack
Introduction
Key characteristics
At Glance
Standardization, Migration &Adaptation
Service models
Deployment models
Network as a Service
Software as a Service (SaaS).
Platform as a Service (PaaS).
Infrastructure as a Service (IaaS).
Communications as a Service (CaaS)
Data as a Service - DaaS
Benefits & Challenges
Security Risks & Challenges
Cloud Vendors
cloud computing is a growing field in computer science. This ppt can help the beginners understand it. contains information about PaaS, Iaas, SaaS and other concepts of Cloud Computing.It also contains a video on cloud computing.
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGEditor IJMTER
Public-key cryptosystems produce constant-size cipher texts with efficient delegation
of decryption rights for any set of cipher texts. One can aggregate any set of secret keys and make
them as compact as a single key. The secret key holder can release a constant-size aggregate key for
flexible choices of cipher text set in cloud storage. In KAC, users encrypt a message not only under a
public-key, but also under an identifier of cipher text called class. That means the cipher texts are
further categorized into different classes. The key owner holds a master-secret called master-secret
key, which can be used to extract secret keys for different classes. More importantly, the extracted
key have can be an aggregate key which is as compact as a secret key for a single class, but
aggregates the power of many such keys, i.e., the decryption power for any subset of cipher text
classes. The key aggregate cryptosystem is enhanced with boundary less cipher text classes. The
system is improved with device independent key distribution mechanism. The key distribution
process is enhanced with security features to protect key leakage. The key parameter transmission
process is integrated with the cipher text download process.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Cloud computing basically involves delivering hosted services over the Internet to store, manage, and process data, instead of using local server or a personal computer. These services are broadly divided into three categories: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). In scientific terms, cloud computing is a synonym for distributed computing over a network which means the ability to run a program on many connected computers at the same time. Therefore it involves a large number of computers that are connected through a real-time communication network.
Due to availability of internet and evolution of embedded devices, Internet of things can be useful to contribute in energy domain. The Internet of Things (IoT) will deliver a smarter grid to enable more information and connectivity throughout the infrastructure and to homes. Through the IoT, consumers, manufacturers and utility providers will come across new ways to manage devices and ultimately conserve resources and save money by using smart meters, home gateways, smart plugs and connected appliances. The future smart home, various devices will be able to measure and share their energy consumption, and actively participate in house-wide or building wide energy management systems. This paper discusses the different approaches being taken worldwide to connect the smart grid. Full system solutions can be developed by combining hardware and software to address some of the challenges in building a smarter and more connected smart grid.
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
In the era of computing technology, Internet of Things (IoT) devices are now popular in each and every domains like e-governance, e-Health, e-Home, e-Commerce, and e-Trafficking etc. Iot is spreading from small to large applications in all fields like Smart Cities, Smart Grids, Smart Transportation. As on one side IoT provide facilities and services for the society. On the other hand, IoT security is also a crucial issues.IoT security is an area which totally concerned for giving security to connected devices and networks in the IoT .As, IoT is vast area with usability, performance, security, and reliability as a major challenges in it. The growth of the IoT is exponentially increases as driven by market pressures, which proportionally increases the security threats involved in IoT The relationship between the security and billions of devices connecting to the Internet cannot be described with existing mathematical methods. In this paper, we explore the opportunities possible in the IoT with security threats and challenges associated with it.
In today’s emerging world of Internet, each and every thing is supposed to be in connected mode with the help of billions of smart devices. By connecting all the devises used in our day to day life, make our life trouble less and easy. We are incorporated in a world where we are used to have smart phones, smart cars, smart gadgets, smart homes and smart cities. Different institutes and researchers are working for creating a smart world for us but real question which we need to emphasis on is how to make dumb devises talk with uncommon hardware and communication technology. For the same what kind of mechanism to use with various protocols and less human interaction. The purpose is to provide the key area for application of IoT and a platform on which various devices having different mechanism and protocols can communicate with an integrated architecture.
Study on Issues in Managing and Protecting Data of IOTijsrd.com
This paper discusses variety of issues for preserving and managing data produced by IoT. Every second large amount of data are added or updated in the IoT databases across the heterogeneous environment. While managing the data each phase of data processing for IoT data is exigent like storing data, querying, indexing, transaction management and failure handling. We also refer to the problem of data integration and protection as data requires to be fit in single layout and travel securely as they arrive in the pool from diversified sources in different structure. Finally, we confer a standardized pathway to manage and to defend data in consistent manner.
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
Today with advancement in Information Communication Technology (ICT) the way the education is being delivered is seeing a paradigm shift from boring classroom lectures to interactive applications such as 2-D and 3-D learning content, animations, live videos, response systems, interactive panels, education games, virtual laboratories and collaborative research (data gathering and analysis) etc. Engineering is emerging with more innovative solutions in the field of education and bringing out their innovative products to improve education delivery. The academic institutes which were once hesitant to use such technology are now looking forward to such innovations. They are adopting the new ways as they are realizing the vast benefits of using such methods and technology. The benefits are better comprehensibility, improved learning efficiency of students, and access to vast knowledge resources, geographical reach, quick feedback, accountability and quality research. This paper focuses on how engineering can leverage the latest technology and build a collaborative learning environment which can then be integrated with the national e-learning grid.
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
In the world more than 15% people are living with disability that also include children below age of 10 years. Due to lack of independent support services specially abled (handicap) people overly rely on other people for their basic needs, that excludes them from being financially and socially active. The Internet of Things (IoT) can give support system and a better quality of life as well as participation in routine and day to day life. For this purpose, the future solutions for current problems has been introduced in this paper. Daunting challenges have been considered as future research and glimpse of the IoT for specially abled person is given in the paper.
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
Internet of things (IoT) is the most powerful invention and if used in the positive direction, internet can prove to be very productive. But, now a days, due to the social networking sites such as Face book, WhatsApp, twitter, hike etc. internet is producing adverse effects on the student life, especially those students studying at college Level. As it is rightly said, something which has some positive effects also has some of the negative effects on the other hand. In this article, we are discussing some adverse effects of IoT on student’s life.
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
The use of information and communications technology (ICT) in education is a relatively new phenomenon and it has been the educational researchers' focus of attention for more than two decades. Educators and researchers examine the challenges of using ICT and think of new ways to integrate ICT into the curriculum. However, there are some barriers for the teachers that prevent them to use ICT in the classroom and develop supporting materials through ICT. The purpose of this study is to examine the high school English teachers’ perceptions of the factors discouraging teachers to use ICT in the classroom.
In recent years usage of private vehicles create urban traffic more and more crowded. As result traffic becomes one of the important problems in big cities in all over the world. Some of the traffic concerns are traffic jam and accidents which have caused a huge waste of time, more fuel consumption and more pollution. Time is very important parameter in routine life. The main problem faced by the people is real time routing. Our solution Virtual Eye will provide the current updates as in the real time scenario of the specific route. This research paper presents smart traffic navigation system, based on Internet of Things, which is featured by low cost, high compatibility, easy to upgrade, to replace traditional traffic management system and the proposed system can improve road traffic tremendously.
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
In this work there is illustrated an ontological model of educational programs in computer science for bachelor and master degrees in Computer science and for master educational program “Computer science as second competence†by Tempus project PROMIS.
Understanding IoT Management for Smart Refrigeratorijsrd.com
Lately the concept of Internet of Things (IoT) is being more elaborated and devices and databases are proposed thereby to meet the need of an Internet of Things scenario. IoT is being considered to be an integral part of smart house where devices will be connected to each other and also react upon certain environmental input. This will eventually include the home refrigerator, air conditioner, lights, heater and such other home appliances. Therefore, we focus our research on the database part for such an IoT’ fridge which we called as smart Fridge. We describe the potentials achievable through a database for an IoT refrigerator to manage the refrigerator food and also aid the creation of a monthly budget of the house for a family. The paper aims at the data management issue based on a proposed design for an intelligent refrigerator leveraging the sensor technology and the wireless communication technology. The refrigerator which identifies products by reading the barcodes or RFID tags is proposed to order the required products by connecting to the Internet. Thus the goal of this paper is to minimize human interaction to maintain the daily life events.
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
Double wishbone designs allow the engineer to carefully control the motion of the wheel throughout suspension travel. 3-D model of the Lower Wishbone Arm is prepared by using CAD software for modal and stress analysis. The forces and moments are used as the boundary conditions for finite element model of the wishbone arm. By using these boundary conditions static analysis is carried out. Then making the load as a function of time; quasi-static analysis of the wishbone arm is carried out. A finite element based optimization is used to optimize the design of lower wishbone arm. Topology optimization and material optimization techniques are used to optimize lower wishbone arm design.
A Review: Microwave Energy for materials processingijsrd.com
Microwave energy is a latest largest growing technique for material processing. This paper presents a review of microwave technologies used for material processing and its use for industrial applications. Advantages in using microwave energy for processing material include rapid heating, high heating efficiency, heating uniformity and clean energy. The microwave heating has various characteristics and due to which it has been become popular for heating low temperature applications to high temperature applications. In recent years this novel technique has been successfully utilized for the processing of metallic materials. Many researchers have reported microwave energy for sintering, joining and cladding of metallic materials. The aim of this paper is to show the use of microwave energy not only for non-metallic materials but also the metallic materials. The ability to process metals with microwave could assist in the manufacturing of high performance metal parts desired in many industries, for example in automotive and aeronautical industries.
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
With an expontial growth of World Wide Web, there are so many information overloaded and it became hard to find out data according to need. Web usage mining is a part of web mining, which deal with automatic discovery of user navigation pattern from web log. This paper presents an overview of web mining and also provide navigation pattern from classification and clustering algorithm for web usage mining. Web usage mining contain three important task namely data preprocessing, pattern discovery and pattern analysis based on discovered pattern. And also contain the comparative study of web mining techniques.
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
Application of FACTS controller called Static Synchronous Compensator STATCOM to improve the performance of power grid with Wind Farms is investigated .The essential feature of the STATCOM is that it has the ability to absorb or inject fastly the reactive power with power grid . Therefore the voltage regulation of the power grid with STATCOM FACTS device is achieved. Moreover restoring the stability of the power system having wind farm after occurring severe disturbance such as faults or wind farm mechanical power variation is obtained with STATCOM controller . The dynamic model of the power system having wind farm controlled by proposed STATCOM is developed . To validate the powerful of the STATCOM FACTS controller, the studied power system is simulated and subjected to different severe disturbances. The results prove the effectiveness of the proposed STATCOM controller in terms of fast damping the power system oscillations and restoring the power system stability.
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
Now a days solar harvesting is more popular. As the popularity become higher the material quality and solar tracking methods are more improved. There are several factors affecting the solar system. Major influence on solar cell, intensity of source radiation and storage techniques The materials used in solar cell manufacturing limit the efficiency of solar cell. This makes it particularly difficult to make considerable improvements in the performance of the cell, and hence restricts the efficiency of the overall collection process. Therefore, the most attainable maximum power point tracking method of improving the performance of solar power collection is to increase the mean intensity of radiation received from the source used. The purposed of tracking system controls elevation and orientation angles of solar panels such that the panels always maintain perpendicular to the sunlight. The measured variables of our automatic system were compared with those of a fixed angle PV system. As a result of the experiment, the voltage generated by the proposed tracking system has an overall of about 28.11% more than the fixed angle PV system. There are three major approaches for maximizing power extraction in medium and large scale systems. They are sun tracking, maximum power point (MPP) tracking or both.
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
In day today's relevance, it is mandatory to device the usage of diesel in an economic way. In present scenario, the very low combustion efficiency of CI engine leads to poor performance of engine and produces emission due to incomplete combustion. Study of research papers is focused on the improvement in efficiency of the engine and reduction in emissions by adding ethanol in a diesel with different blends like 5%, 10%, 15%, 20%, 25% and 30% by volume. The performance and emission characteristics of the engine are tested observed using blended fuels and comparative assessment is done with the performance and emission characteristics of engine using pure diesel.
Study and Review on Various Current Comparatorsijsrd.com
This paper presents study and review on various current comparators. It also describes low voltage current comparator using flipped voltage follower (FVF) to obtain the single supply voltage. This circuit has short propagation delay and occupies a small chip area as compare to other current comparators. The results of this circuit has obtained using PSpice simulator for 0.18 μm CMOS technology and a comparison has been performed with its non FVF counterpart to contrast its effectiveness, simplicity, compactness and low power consumption.
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
Power dissipation is a challenging problem for today's system-on-chip design and test. This paper presents a novel architecture which generates the test patterns with reduced switching activities; it has the advantage of low test power and low hardware overhead. The proposed LP-TPG (test pattern generator) structure consists of modified low power linear feedback shift register (LP-LFSR), m-bit counter, gray counter, NOR-gate structure and XOR-array. The seed generated from LP-LFSR is EXCLUSIVE-OR ed with the data generated from gray code generator. The XOR result of the sequence is single input changing (SIC) sequence, in turn reduces the switching activity and so power dissipation will be very less. The proposed architecture is simulated using Modelsim and synthesized using Xilinx ISE9.2.The Xilinx chip scope tool will be used to test the logic running on FPGA.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
In the last decade, the greatest threat to the wireless sensor network has been Reactive Jamming Attack because it is difficult to be disclosed and defend as well as due to its mass destruction to legitimate sensor communications. As discussed above about the Reactive Jammers Nodes, a new scheme to deactivate them efficiently is by identifying all trigger nodes, where transmissions invoke the jammer nodes, which has been proposed and developed. Due to this identification mechanism, many existing reactive jamming defending schemes can be benefited. This Trigger Identification can also work as an application layer .In this paper, on one side we provide the several optimization problems to provide complete trigger identification service framework for unreliable wireless sensor networks and on the other side we also provide an improved algorithm with regard to two sophisticated jamming models, in order to enhance its robustness for various network scenarios.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...NelTorrente
In this research, it concludes that while the readiness of teachers in Caloocan City to implement the MATATAG Curriculum is generally positive, targeted efforts in professional development, resource distribution, support networks, and comprehensive preparation can address the existing gaps and ensure successful curriculum implementation.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
How to Build a Module in Odoo 17 Using the Scaffold Method
An study of security issues & challenges in cloud computing
1. IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 09, 2014 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 491
An Study of Security Issues & Challenges in Cloud Computing
Mili Patel1 Rakesh Patel2
1,2
Lecturer
1,2
Department of Information Technology
1,2
Kirodimal Institute of Technology Raigarh (C.G.), India
Abstract— “Cloud Computing” is a term, which involves
virtualization, distributed computing, networking and web-
services. It is a way of offering services to users by
allowing them to tap into a massive pool of shared
computing resources such as servers, storage and network.
User can use services by simply plug into the cloud and pay
only for what he uses. All these features made a cloud
computing very advantageous and demanding. But the data
privacy is a key security problem in cloud computing
which comprises of data integrity, data confidentiality and
user privacy specific concerns. Most of the persons do not
prefer cloud to store their data as they are having a fear of
losing the privacy of their confidential data. This paper
introduces some cloud computing data security problem
and its strategy to solve them which also satisfies the
user regarding their data security.
Key words: cloud computing, cloud data security, strategy
I. INTRODUCTION
A. What Is Cloud Computing?
Cloud computing (‘cloud’) is an evolving term that
describes the development of many existing technologies
and approaches to computing into something different.
Cloud separates application and information resources from
the underlying infrastructure, and the mechanisms used to
deliver them. Cloud enhances collaboration, agility, scaling,
and availability, and provides the potential for cost reduction
through optimized and efficient computing. More
specifically, cloud describes the use of a collection of
services, applications, information, and infrastructure
comprised of pools of compute, network, information, and
storage resources. These components can be rapidly
orchestrated, provisioned, implemented and
decommissioned, and scaled up or down; providing for an
on-demand utility-like model of allocation and consumption.
From an architectural perspective; there is much confusion
surrounding how cloud is both similar to and different from
existing models of computing; and how these similarities
and differences impact the organizational, operational, and
technological approaches to network and information
security practices.
II. ESSENTIAL CHARACTERISTICS OF CLOUD COMPUTING
Cloud services exhibit five essential characteristics that
demonstrate their relation to, and differences from,
traditional computing approaches:
A. On-Demand Self-Service
A consumer can unilaterally provision computing
capabilities such as server time and network storage as
needed automatically, without requiring human interaction
with a service provider.
B. Broad network access
Capabilities are available over the network and accessed
through standard mechanisms that promote use by
heterogeneous thin or thick client platforms (e.g., mobile
phones, laptops, and PDAs) as well as other traditional or
cloud based software services.
C. Resource pooling
The provider’s computing resources are pooled to serve
multiple consumers using a multi-tenant model, with
different physical and virtual resources dynamically
assigned and reassigned according to consumer demand.
There is a degree of location independence in that the
customer generally has no control or knowledge over the
exact location of the provided resources, but may be able to
specify location at a higher level of abstraction (e.g.,
country, state, or datacenter). Examples of resources include
storage, processing, memory, network bandwidth, and
virtual machines. Even private clouds tend to pool resources
between different parts of the same organization.
D. Rapid elasticity
Capabilities can be rapidly and elastically provisioned —in
some cases automatically —to quickly scale out; and rapidly
released to quickly scale in. To the consumer, the
capabilities available for provisioning often appear to be
unlimited and can be purchased in any quantity at any time.
E. Measured service
Cloud systems automatically control and optimize resource
usage by leveraging a metering capability at some level of
abstraction appropriate to the type of service (e.g., storage,
processing, bandwidth, or active user accounts). Resource
usage can be monitored, controlled, and reported —
providing transparency for both the provider and consumer
of the service. It is important to recognize that cloud
services are often but not always utilized in conjunction
with, and enabled by, virtualization technologies. There is
no requirement, however, that ties the abstraction of
resources to virtualization technologies and in many
offerings virtualization by hypervisor or operating system
container is not utilized. Further, it should be noted that
multi-tenancy is not called out as an essential cloud
characteristic by NIST but is often discussed as such. Please
refer to the section on multi-tenancy featured after the cloud
deployment model description below for further details.
III. CLOUD SERVICE MODELS
Cloud service delivery is divided among three archetypal
models and various derivative combinations. The three
fundamental classifications are often referred to as the “SPI
Model,” where ‘SPI’ refers to Software, Platform or
Infrastructure (as a Service), respectively —defined thus:
2. An Study of Security Issues & Challenges in Cloud Computing
(IJSRD/Vol. 2/Issue 09/2014/110)
All rights reserved by www.ijsrd.com 492
A. Cloud Software as a Service (SaaS)
Cloud service delivery is divided among three archetypal
models and various derivative combinations. The three
fundamental classifications are often referred to as the “SPI
Model,” where ‘SPI’refers to Software, Platform or
Infrastructure (as a Service), respectively —defined thus:
B. Cloud Platform as a Service (PaaS)
The capability provided to the consumer is to deploy onto
the cloud infrastructure consumer-created or acquired
applications created using programming languages and tools
supported by the provider. The consumer does not manage
or control the underlying cloud infrastructure including
network, servers, operating systems, or storage, but has
control over the deployed applications and possibly
application hosting environment configurations.
C. Cloud Infrastructure as a Service (IaaS)
The capability provided to the consumer is to provision
processing, storage, networks, and other fundamental
computing resources where the consumer is able to deploy
and run arbitrary software, which can include operating
systems and applications. The consumer does not manage or
control the underlying cloud infrastructure but has control
over operating systems; storage, deployed applications, and
possibly limited control of select networking components
(e.g., host firewalls).
IV. CLOUD DEPLOYMENT MODELS
Regardless of the service model utilized (SaaS, PaaS, or
IaaS) there are four deployment models for cloud services,
with derivative variations that address specific requirements:
A. Public Cloud:
The cloud infrastructure is made available to the general
public or a large industry group and is owned by an
organization selling cloud services.
B. Private Cloud
The cloud infrastructure is operated solely for a single
organization. It may be managed by the organization or a
third party, and may exist on-premises or off premises.
C. Community Cloud
The cloud infrastructure is shared by several organizations
and supports a specific community that has shared concerns
(e.g., mission, security requirements, policy, or compliance
considerations). It may be managed by the organizations or
a third party and may exist on-premises or off-premises.
D. Hybrid Cloud
The cloud infrastructure is a composition of two or more
clouds (private, community, or public) that remain unique
entities but are bound together by standardized or
proprietary technology that enables data and application
portability (e.g., cloud bursting for load-balancing between
clouds).
It is important to note that there are derivative
cloud deployment models emerging due to the maturation of
market offerings and customer demand. An example of such
is virtual private clouds —a way of utilizing public cloud
infrastructure in a private or semi-private manner and
interconnecting these resources to the internal resources of a
consumers’ datacenter, usually via virtual private network
(VPN) connectivity. The architectural mindset used when
designing “solutions have clear implications on the future
flexibility, security, and mobility of the resultant solution, as
well as its collaborative capabilities. As a rule of thumb,
parameterized solutions are less effective than de-
perimeterized solutions in each of the four areas. Careful
consideration should also be given to the choice between
proprietary and open solutions for similar reasons.
V. MULTI-TENANCY
CSA has identified multi-tenancy as an important element of
cloud. Multi-tenancy in cloud service models implies a need
for policy-driven enforcement, segmentation, isolation,
governance, service levels, and chargeback/billing models
for different consumer constituencies. Consumers might
utilize a public cloud provider’s service offerings or actually
be from the same organization, such as different business
units rather than distinct organizational entities, but would
still share infrastructure. From a provider’s perspective,
multi-tenancy suggests an architectural and design approach
to enable economies of scale, availability, management,
3. An Study of Security Issues & Challenges in Cloud Computing
(IJSRD/Vol. 2/Issue 09/2014/110)
All rights reserved by www.ijsrd.com 493
segmentation, isolation, and operational efficiency;
leveraging shared infrastructure, data, metadata, services,
and applications across many different consumers. Multi-
tenancy can also take on different definitions depending
upon the cloud service model of the provider; in as much as
it may entail enabling the capabilities described above at the
infrastructure, database, or application levels. An example
would be the difference between an IaaS and SaaS multi-
tenant implementation. Cloud deployment models place
different importance on multi-tenancy. However, even in the
case of a private cloud, a single organization may have a
multitude of third party consultants and contractors, as well
as a desire for a high degree of logical separation between
business units. Thus multi-tenancy concerns should always
be considered.
VI. CLOUD REFERENCE MODEL
Understanding the relationships and dependencies between
Cloud Computing models is critical to understanding Cloud
Computing security risks. IaaS is the foundation of all cloud
services, with PaaS building upon IaaS, and SaaS in turn
building upon PaaS as described in the Cloud Reference
Model diagram. In this way, just as capabilities are
inherited, so are information security issues and risk. It is
important to note that commercial cloud providers may not
neatly fit into the layered service models. Nevertheless, the
reference model is important for relating real-world services
to an architectural framework and understanding the
resources and services requiring security analysis. IaaS
includes the entire infrastructure resource stack from the
facilities to the hardware platforms that reside in them. It
incorporates the capability to abstract resources (or not), as
well as deliver physical and logical connectivity to those
resources. Ultimately, IaaS provides a set of APIs which
allow management and other forms of interaction with the
infrastructure by consumers. PaaS sits atop IaaS and adds an
additional layer of integration with application development
frameworks; middleware capabilities; and functions such as
database, messaging, and queuing; which allow developers
to build applications upon to the platform; and whose
programming languages and tools are supported by the
stack. SaaS in turn is built upon the underlying IaaS and
PaaS stacks; and provides a self-contained operating
environment used to deliver the entire user experience
including the content, its presentation, the application(s),
and management capabilities. It should therefore be clear
that there are significant trade-offs to each model in terms of
integrated features, complexity vs. openness (extensibility),
and security.
For an excellent overview of the many cloud
computing use cases, the Cloud Computing Use Case Group
produced a collaborative work to describe and define
common cases and demonstrate the benefits of cloud, with
their goal being to “...bring together cloud consumers and
cloud vendors to define common use cases for cloud
computing...and highlight the capabilities and requirements
that need to be standardized in a cloud environment to
ensure interoperability, ease of integration, and portability.”
4. An Study of Security Issues & Challenges in Cloud Computing
(IJSRD/Vol. 2/Issue 09/2014/110)
All rights reserved by www.ijsrd.com 494
Fig 4: Open Cloud Taxonomy
VII. CLOUD SECURITY REFERENCE MODEL
The cloud security reference model addresses the
relationships of these classes and places them in context
with their relevant security controls and concerns. For
organizations and individuals grappling with cloud
computing for the first time, it is important to note the
following to avoid potential pitfalls and confusion:
The notion of how cloud services are deployed is
often used interchangeably with where they are
provided, which can lead to confusion. For
example, public or private clouds may be described
as external or internal clouds, which may or may
not be accurate in all situations.
The manner in which cloud services are consumed
is often described relative to the location of an
organization’s management or security perimeter
(usually defined by the presence of a firewall).
While it is important to understand where security
boundaries lie in terms of cloud computing, the
notion of a well-demarcated perimeter is an
anachronistic concept.
The re-parameterization and the erosion of trust
boundaries already happening in the enterprise is
amplified and accelerated by cloud computing.
Ubiquitous connectivity, the amorphous nature of
information interchange, and the ineffectiveness of
traditional static security controls which cannot
deal with the dynamic nature of cloud services, all
require new thinking with regard to cloud
computing. The Jericho Forum has produced a
considerable amount of material on the re-
parameterizations of enterprise networks, including
many case studies. The deployment and
consumption modalities of cloud should be thought
of not only within the context of ‘internal’ vs.
‘external’ as they relate to the physical location of
assets, resources, and information; but also by
whom they are being consumed by; and who is
responsible for their governance, security, and
compliance with policies and standards. This is not
to suggest that the on-or off-premise location of an
asset, a resource, or information does not affect the
security and risk posture of an organization because
they do —but to underscore that risk also depends
upon:
1) The types of assets, resources, and information
being managed
2) Who manages them and how
3) Which controls are selected and how they are
integrated
5. An Study of Security Issues & Challenges in Cloud Computing
(IJSRD/Vol. 2/Issue 09/2014/110)
All rights reserved by www.ijsrd.com 495
Fig: Mapping the Cloud Model to the Security Control & Compliance Model
VIII. WHAT IS SECURITY FOR CLOUD COMPUTING?
Security controls in cloud computing are, for the most part,
no different than security controls in any IT environment.
However, because of the cloud service models employed,
the operational models, and the technologies used to enable
cloud services, cloud computing may present different risks
to an organization than traditional IT solutions. Cloud
computing is about gracefully losing control while
maintaining accountability even if the operational
responsibility falls upon one or more third parties.
An organization’s security posture is characterized
by the maturity, effectiveness, and completeness of the risk-
adjusted security controls implemented. These controls are
implemented in one or more layers ranging from the
facilities (physical security), to the network infrastructure de
(network security), to the IT systems (system security), all
the way to the information and applications (application
security). Additionally controls are implemented at the
people and process levels, such as separation of duties and
change management, respectively. As described earlier in
this document, the security responsibilities of both the
provider and the consumer greatly differ between cloud
service models. Amazon’s AWS EC2 infrastructure as a
service offering, as an example, includes vendor
responsibility for security up to the hypervisor, meaning
they can only address security controls such as physical
security, environmental security, and virtualization security.
The consumer, in turn, is responsible for security controls
that relate to the IT system (instance) including the
operating system, applications, and data. One of the
attractions of cloud computing is the cost efficiencies
afforded by economies of scale, reuse, and standardization.
To bring these efficiencies to bear, cloud providers have to
provide services that are flexible enough to serve the largest
customer base possible, maximizing their addressable
market. The figure below illustrates these issues: in SaaS
environments the security controls and their scope are
negotiated into the contracts for service; service levels,
privacy, and compliance are all issues to be dealt with
legally in contracts. In an IaaS offering, while the
responsibility for securing the underlying infrastructure and
abstraction layers belongs to the provider, the remainder of
the stack is the consumer’s responsibility. PaaS offers a
balance somewhere in between, where securing the platform
itself falls onto the provider, but securing the applications
developed against the platform and developing them
securely, both belong to the consumer. Understanding the
impact of these differences between service models and how
they are deployed is critical to managing the risk posture of
an organization.
IX. BEYOND ARCHITECTURE: THE AREAS OF CRITICAL
FOCUS
The twelve other domains which comprise the remainder of
the CSA guidance highlight areas of concern for cloud
computing and are tuned to address both the strategic and
tactical security ‘pain points’ within a cloud environment,
and can be applied to any combination of cloud service and
deployment model. The domains are divided into two broad
categories: governance and operations. The governance
domains are broad and address strategic and policy issues
within a cloud computing environment, while the
operational domains focus on more tactical security
concerns and implementation within the architecture.
Governance Domains Domain Guidance dealing with
...Governance and Enterprise Risk Management The ability
of an organization to govern and measure enterprise risk
introduced by Cloud Computing. Items such as legal
precedence for agreement breaches, ability of user
organizations to adequately assess risk of a cloud provider,
responsibility to protect sensitive data when both user and
provider may be at fault, and how international boundaries
may affect these issues, are some of the items discussed.
Legal and Electronic Discovery Potential legal issues when
using Cloud Computing Issues touched on in this section
include protection requirements for information and
computer systems, security breach disclosure laws,
regulatory requirements, privacy requirements, international
laws, etc. Compliance and Audit Maintaining and proving
6. An Study of Security Issues & Challenges in Cloud Computing
(IJSRD/Vol. 2/Issue 09/2014/110)
All rights reserved by www.ijsrd.com 496
compliance when using Cloud Computing Issues dealing
with evaluating how Cloud Computing affects compliance
with internal security policies, as well as various compliance
requirements (regulatory, legislative, and otherwise) are
discussed here. This domain includes some direction on
proving compliance during an audit.
X. INFORMATION LIFECYCLE MANAGEMENT
Managing data that is placed in the cloud Items surrounding
the identification and control of data in the cloud, as well as
compensating controls which can be used to deal with the
loss of physical control when moving data to the cloud, are
discussed here. Other items, such as who is responsible for
data confidentiality, integrity, and availability are
mentioned. Portability and Interoperability The ability to
move data/services from one provider to another, or bring it
entirely back in house. Issues surrounding interoperability
between providers are also discussed. Operational Domains
Traditional Security, Business Continuity and Disaster
Recovery How Cloud Computing affects the operational
processes and procedures currently use to implement
security, business continuity, and disaster recovery. The
focus is to discuss and examine possible risks of Cloud
Computing, in hopes of increasing dialogue and debate on
the overwhelming demand for better enterprise risk
management models. Further, the section touches on helping
people to identify where Cloud Computing may assist in
diminishing certain security risks, or entails increases in
other areas.
XI. DATA CENTER OPERATIONS
How to evaluate a provider’s data center architecture and
operations this is primarily focused on helping users identify
common data center characteristics that could be detrimental
to ongoing services, as well as characteristics that are
fundamental to long-term stability. Incident Response,
Notification and Remediation Proper and adequate incident
detection, response, notification, and remediation This
attempts to address items that should be in place at both
provider and user levels to enable proper incident handling
and forensics. This domain will help you understand the
complexities the cloud brings to your current incident
handling program. Application Security Securing
application software that is running on or being developed in
the cloud
XII. CONCLUSION
This includes items such as whether it’s appropriate to
migrate or design an application to run in the cloud, and if
so, what type of cloud platform is most appropriate (SaaS,
PaaS, or IaaS). Some specific security issues related to the
cloud are also discussed. Encryption and Key Management
Identifying proper encryption usage and scalable key
management This section is not prescriptive, but is more
informational is discussing why they are needed and
identifying issues that arise in use, both for protecting access
to resources as well as for protecting data. Identity and
Access Management Managing identities and leveraging
directory services to provide access control. The focus is on
issues encountered when extending an organization’s
identity into the cloud. This section provides sin sight into
assessing an organization’s readiness to conduct cloud-
based Identity and Access Management (IAM).
Virtualization The use of virtualization technology in Cloud
Computing. The domain addresses items such as risks
associated with multi-tenancy, VM isolation, VM co-
residence, hypervisor vulnerabilities, etc. This domain
focuses on the security issues surrounding system/hardware
virtualization, rather than a more general survey of all forms
of virtualization.
REFRENCES
[1] Cloud Computing Issues and Benefits Modern
Education By D.Kasi Viswanath, S.Kusuma &
Saroj Kumar Gupta Madanapalle Institute of
Technology and Science Madanapalle, Chittoor
India
[2] Data Security Issues and Strategy on Cloud
Computing by Sonam Singh , Department of
Computer Science and Engineering, I.F.T.M
University , Moradabad Province 244001, India
[3] An Overview and Study of Security Issues &
Challenges in Cloud Computing Rajesh Piplode*
by Umesh Kumar Singh Department of Computer
Science Institute Of Computer Science Govt.
Holkar Science College Indore-India Vikram
University Ujjain-India
[4] Security Threats and Countermeasures in Cloud
Computing Vahid Ashktorab, Seyed Reza
Taghizadeh Department of Computer Engineering,
Islamic Azad University of NajafAbaad, Isfahan,
Iran Department of Information Technology,
Kahje-Nassir-Toosi University of Technology,
Tehran, Iran
[5] Cloud Computing Security Issues, Challenges and
Solution Pradeep Kumar Tiwari1, Dr. Bharat
Mishra M.phil (CSE)student, Reader in department
of physical Science, at Mahatma Gandhi Chitrakoot
Gramodaya Vishwavidyalaya Chitrakoot - Satna
(M.P.)