IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
Cloud computing is a model for enabling convenient, on-demand network access
to a shared pool of configurable computing resources. Reliability in compute cloud is an
important aspect in Quality of Service which needs to be addressed in order to foster the
adoption of compute cloud. In today’s integrated environment the distributed systems is
employed to carry out computational intensive task at a faster rate without much
investment. The Cloud is a multitenant architecture which allows faster computation with
high scalability at a lower cost thereby the users can share the same physical infrastructure.
Individual customers deploy their applications in such environment will occupy the virtual
partitions on the platform. This paper describes a straightforward procedure to analyze the
reliability of the application from the view point of the resource provider. A trust
component is implemented to provide preventive control and to mitigate the occurrence of
any non-permissible action by using the detective mechanism. Such mechanisms are used to
identify the privacy risk and it further prevents from utilization. Hence, in this paper trust
assessment is performed before the user is allowed to share the multitenant infrastructure.
The cloud can provide scalable and reliable service for the legitimate users. The proposed
work is tested using tools Aneka and Globus Toolkit.
With the recent increase demand for cloud services, handling clients’ needs is getting increasingly challenging. Responding to all requesting clients with no exception could lead to security breaches, and
since it is the provider’s responsibility to secure not only the offered cloud services but also the data, it is important to ensure clients reliability. Although filtering clients in the cloud is not so common, it is
required to assure cloud safety.
In this paper, we made use of multi agent system interaction mechanisms to handle the cloud interactions for the providers’ side, and of Particle Swarm Optimization to select the and determine the accurate trust
weight and therefore to filtrate the clients by determining malicious and untrustworthy clients. The selection depends on previous knowledge and overall rating of trusted peers. The conducted experiments
proves that the combination between MAS, PSO and trust outputs relevant results with different number of peers, the solution is able to converge to the best result after small number of iterations. To explore more space and scenarios, synthetic data was generated to improve the model’s precision .
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...IJNSA Journal
The latest trend in the field of computing is the migration of organizations and offloading the tasks to
cloud. The security concerns hinder the widespread acceptance of cloud. Of various, the DDoS in cloud is
found to be the most dangerous. Various approaches are there to defend DDoS in cloud, but have lots of
pitfalls. This paper proposes a new reputation-based framework for mitigating the DDoS in cloud by
classifying the users into three categories as well-reputed, reputed and ill-reputed based on credits. The
fact that attack is fired by malicious programs installed by the attackers in the compromised systems and
they exhibit similar characteristics used for discriminating the DDoS traffic from flash crowds. Credits of
clients who show signs of similarity are decremented. This reduces the computational and storage
overhead. This proposed method is expected to take the edge off DDoS in a cloud environment and ensures
full security to cloud resources. CloudSim simulation results also proved that the deployment of this
approach improved the resource utilization with reduced cost.
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
Cloud computing is a model for enabling convenient, on-demand network access
to a shared pool of configurable computing resources. Reliability in compute cloud is an
important aspect in Quality of Service which needs to be addressed in order to foster the
adoption of compute cloud. In today’s integrated environment the distributed systems is
employed to carry out computational intensive task at a faster rate without much
investment. The Cloud is a multitenant architecture which allows faster computation with
high scalability at a lower cost thereby the users can share the same physical infrastructure.
Individual customers deploy their applications in such environment will occupy the virtual
partitions on the platform. This paper describes a straightforward procedure to analyze the
reliability of the application from the view point of the resource provider. A trust
component is implemented to provide preventive control and to mitigate the occurrence of
any non-permissible action by using the detective mechanism. Such mechanisms are used to
identify the privacy risk and it further prevents from utilization. Hence, in this paper trust
assessment is performed before the user is allowed to share the multitenant infrastructure.
The cloud can provide scalable and reliable service for the legitimate users. The proposed
work is tested using tools Aneka and Globus Toolkit.
With the recent increase demand for cloud services, handling clients’ needs is getting increasingly challenging. Responding to all requesting clients with no exception could lead to security breaches, and
since it is the provider’s responsibility to secure not only the offered cloud services but also the data, it is important to ensure clients reliability. Although filtering clients in the cloud is not so common, it is
required to assure cloud safety.
In this paper, we made use of multi agent system interaction mechanisms to handle the cloud interactions for the providers’ side, and of Particle Swarm Optimization to select the and determine the accurate trust
weight and therefore to filtrate the clients by determining malicious and untrustworthy clients. The selection depends on previous knowledge and overall rating of trusted peers. The conducted experiments
proves that the combination between MAS, PSO and trust outputs relevant results with different number of peers, the solution is able to converge to the best result after small number of iterations. To explore more space and scenarios, synthetic data was generated to improve the model’s precision .
CREDIT BASED METHODOLOGY TO DETECT AND DISCRIMINATE DDOS ATTACK FROM FLASH CR...IJNSA Journal
The latest trend in the field of computing is the migration of organizations and offloading the tasks to
cloud. The security concerns hinder the widespread acceptance of cloud. Of various, the DDoS in cloud is
found to be the most dangerous. Various approaches are there to defend DDoS in cloud, but have lots of
pitfalls. This paper proposes a new reputation-based framework for mitigating the DDoS in cloud by
classifying the users into three categories as well-reputed, reputed and ill-reputed based on credits. The
fact that attack is fired by malicious programs installed by the attackers in the compromised systems and
they exhibit similar characteristics used for discriminating the DDoS traffic from flash crowds. Credits of
clients who show signs of similarity are decremented. This reduces the computational and storage
overhead. This proposed method is expected to take the edge off DDoS in a cloud environment and ensures
full security to cloud resources. CloudSim simulation results also proved that the deployment of this
approach improved the resource utilization with reduced cost.
Cloud computing technology security and trust challengesijsptm
A let of exclusive features such as high functionality and low cost have made cloud computing a valuable
technology. These remarkable features give users and companies, countless opportunities to reach their
goals spending minimum cost and time. Looking at the literature of this technology, it can be claimed that
the main concerns of the users of cloud are security issues especially trust. Unfortunately these concerns
have not been tackled yet. Therefore we decided to introduce a useful and functioned way to create more
trust among consumers to use this technology .In this paper we suggest the foundation of an international
certification institute for the service providing companies in order to increase trust and enhance likeliness
of using this new and valuable technology among people. Practicality of the technology will improve it and
will make its security better by providers.
Certification Authority Monitored Multilevel and Stateful Policy Based Author...CSCJournals
Services oriented grids will be more prominent among other kinds of grids in the present distributed environments. With the advent of online government services the governmental grids will come up in huge numbers. Apart from common security issues as in other grids, the authorization in service oriented grids faces certain shortcomings and needs to be looked upon differently. The CMMS model presented here overcomes all these shortcomings and adds to the simplicity of implementation because of its tight similarities with certain government services and their functioning. The model is used to prototype a State Police Information Grid (SPIG). Small technological restructuring is required in PKIX and X.509 certificates.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A study on security responsibilities and adoption in cloudeSAT Journals
Abstract Cloud computing is one of the popular enterprise models where computing resources are made available on-demand to the user as needed. Due to this increasing demand for more clouds there is an ever growing threat of security becoming a major issue. cloud computing is a construct that allows you to access applications that actually reside at a location other than your computer or other Internet-connected device, most often, this will be a distant data center. In a simple, topological sense, a cloud computing solution is made up of several elements: clients, the datacenter, and distributed servers. Each element has a purpose and plays a specific role in delivering a functional cloud based application, the increased degree of connectivity and the increasing amount of data has led many providers and in particular data centers to employ larger infrastructures with dynamic load and access balancing. So this paper shall look at ways in which security responsibilities and Cloud Adoption Keywords: Cloud Computing, Service models, Cloud Security, Secure Cloud Adoption,
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSIJNSA Journal
Cloud computing is a new innovative model for enterprise in which information is permanently stored on the servers and also manage how and when different resources are allocate to the requested users. It provides distributed approach through which resources are allocated dynamically to the users without investing in the infrastructure or licensing the software’s on the client side. Using the cloud makes processing of information is more commodious but it also present them with new security problems about reliability.This phenomenon introduces serious problems regarding access mechanism to any information stored in the database and resources in the cloud. For the successful implementation of cloud computing it is necessary that we must know different areas where the security is needed. For this there should also governess strategy needed for secure communication between multi-clouds located in different geographical areas or in different countries. In this paper we discuss how to safely utilizing the benefit of cloud computing through the network where data security, provide authentication, integration, recovery, IP spoofing and Virtual Servers are the most captiousfields in the cloud.
A challenge for security and service level agreement in cloud computingeeSAT Journals
Abstract One of the most promising field in computing is regarded as cloud computing, which allows users to store their data virtually over the cloud without the need of any fixed infrastructure. It offer user to manipulate their data regardless of the geographical position, hence providing a scalable, feasible and flexible way to connect user to their data. The cloud can be considered as of the Internet where data are usually stored and computing refers to the applications and services that it can provide. Users are connected to cloud by Cloud Service Providers through the Internet connection. Both users and cloud service provider agree on a protocol known as service level agreements for exchange of information. Cloud computing provides increase in capacity and grants the capability to perform computation on cloud infrastructure to its users. Cloud Computing is capable of providing more convenient communication and instant multi-point collaboration feature. Cloud computing provides better utilization of distributed resource over large amount of data and they can be access remotely through the internet. Quality of service should be kept in mind will designing the service level agreement. There are many problem related to cloud computing such as traffic managements, security and privacy. This paper provides a survey on the basic working principle of clouding computing. This paper provides an overview of the cloud architecture including the different types and level of clouds services. In this paper focus has been made upon the service level agreement, issue and security prospectus over the cloud computing. Keywords: Architecture, Cloud Computing, Cloud Security, Cloud Services Service Level Agreements
Data Stream Controller for Enterprise Cloud ApplicationIJSRD
Cloud computing is an emerging computing paradigm where computing resources are provided as services over Internet while residing in a large data center. Even though it enables us to dynamically provide servers with the ability to address a wide range of needs, this paradigm brings forth many new challenges for the data security and access control as users outsource their sensitive data to clouds, which are beyond the same trusted domain as data owners. The occupier need not be concerned with how the Paas system achieves expansion under high load.MAC systems differ as security policy is defined for the entire system, typically by administrators. Information flow control (IFC) is a MAC approach, developed originally from military information management methodologies. IFC can be used to enforce more general policies, using appropriate labeling and checking schemes. The labels can be used to manage both confidentiality and integrity concerns, tracking “secrecy†and “quality†of data, respectively. Decentralized Information Flow Control (DIFC) is an approach to security that allows application writers to control how data flow between the pieces of application and the outside world. As applied to privacy DIFC allows un trusted software to compute with private data while trusted security code controls the release of that data. As applied to integrity DIFC allows trusted code to protect un trusted software from unexpected inputs.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Information security plays an important role in
governments. Its realm has been increased nowadays, especially
with resent viruses’ attacks in different governmental
organizations. The authentication is aspect of information
security, its current scheme used nowadays in the systems is
depend on the login by user name and password in addition to
one-time password or traditional secret questions, which in turn
is usually easy to predicate. This paper proposes enhanced
knowledge based authentication solution which ensures and
provides more security and usability levels for governmental
organizations.
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...iosrjce
Cloud computing is an important transition that makes change in service oriented computing
technology. Cloud service provider follows pay-as-you-go pricing approach which means consumer uses as
many resources as he need and billed by the provider based on the resource consumed. CSP give a quality of
service in the form of a service level agreement. For transparent billing, each billing transaction should be
protected against forgery and false modifications. Although CSPs provide service billing records, they cannot
provide trustworthiness. It is due to user or CSP can modify the billing records. In this case even a third party
cannot confirm that the user’s record is correct or CSPs record is correct. To overcome these limitations we
introduced a secure billing system called THEMIS. For secure billing system THEMIS introduces a concept of
cloud notary authority (CNA). CNA generates mutually verifiable binding information that can be used to
resolve future disputes between user and CSP. This project will produce the secure billing through monitoring
the service level agreement (SLA) by using the SMon module. CNA can get a service logs from SMon and stored
it in a local repository for further reference. Even administrator of a cloud system cannot modify or falsify the
data.
Cloud Computing & ITSM - For Better of for Worse?ITpreneurs
his article explores the question whether the relationship will be “a marriage made in heaven?” It also explores the issue of “who is the bride and who is the groom?” As you read further, you can also decide whether the relationship between Cloud Computing and ITSM is “for better or for worse?”
Cloud computing technology security and trust challengesijsptm
A let of exclusive features such as high functionality and low cost have made cloud computing a valuable
technology. These remarkable features give users and companies, countless opportunities to reach their
goals spending minimum cost and time. Looking at the literature of this technology, it can be claimed that
the main concerns of the users of cloud are security issues especially trust. Unfortunately these concerns
have not been tackled yet. Therefore we decided to introduce a useful and functioned way to create more
trust among consumers to use this technology .In this paper we suggest the foundation of an international
certification institute for the service providing companies in order to increase trust and enhance likeliness
of using this new and valuable technology among people. Practicality of the technology will improve it and
will make its security better by providers.
Certification Authority Monitored Multilevel and Stateful Policy Based Author...CSCJournals
Services oriented grids will be more prominent among other kinds of grids in the present distributed environments. With the advent of online government services the governmental grids will come up in huge numbers. Apart from common security issues as in other grids, the authorization in service oriented grids faces certain shortcomings and needs to be looked upon differently. The CMMS model presented here overcomes all these shortcomings and adds to the simplicity of implementation because of its tight similarities with certain government services and their functioning. The model is used to prototype a State Police Information Grid (SPIG). Small technological restructuring is required in PKIX and X.509 certificates.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A study on security responsibilities and adoption in cloudeSAT Journals
Abstract Cloud computing is one of the popular enterprise models where computing resources are made available on-demand to the user as needed. Due to this increasing demand for more clouds there is an ever growing threat of security becoming a major issue. cloud computing is a construct that allows you to access applications that actually reside at a location other than your computer or other Internet-connected device, most often, this will be a distant data center. In a simple, topological sense, a cloud computing solution is made up of several elements: clients, the datacenter, and distributed servers. Each element has a purpose and plays a specific role in delivering a functional cloud based application, the increased degree of connectivity and the increasing amount of data has led many providers and in particular data centers to employ larger infrastructures with dynamic load and access balancing. So this paper shall look at ways in which security responsibilities and Cloud Adoption Keywords: Cloud Computing, Service models, Cloud Security, Secure Cloud Adoption,
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSIJNSA Journal
Cloud computing is a new innovative model for enterprise in which information is permanently stored on the servers and also manage how and when different resources are allocate to the requested users. It provides distributed approach through which resources are allocated dynamically to the users without investing in the infrastructure or licensing the software’s on the client side. Using the cloud makes processing of information is more commodious but it also present them with new security problems about reliability.This phenomenon introduces serious problems regarding access mechanism to any information stored in the database and resources in the cloud. For the successful implementation of cloud computing it is necessary that we must know different areas where the security is needed. For this there should also governess strategy needed for secure communication between multi-clouds located in different geographical areas or in different countries. In this paper we discuss how to safely utilizing the benefit of cloud computing through the network where data security, provide authentication, integration, recovery, IP spoofing and Virtual Servers are the most captiousfields in the cloud.
A challenge for security and service level agreement in cloud computingeeSAT Journals
Abstract One of the most promising field in computing is regarded as cloud computing, which allows users to store their data virtually over the cloud without the need of any fixed infrastructure. It offer user to manipulate their data regardless of the geographical position, hence providing a scalable, feasible and flexible way to connect user to their data. The cloud can be considered as of the Internet where data are usually stored and computing refers to the applications and services that it can provide. Users are connected to cloud by Cloud Service Providers through the Internet connection. Both users and cloud service provider agree on a protocol known as service level agreements for exchange of information. Cloud computing provides increase in capacity and grants the capability to perform computation on cloud infrastructure to its users. Cloud Computing is capable of providing more convenient communication and instant multi-point collaboration feature. Cloud computing provides better utilization of distributed resource over large amount of data and they can be access remotely through the internet. Quality of service should be kept in mind will designing the service level agreement. There are many problem related to cloud computing such as traffic managements, security and privacy. This paper provides a survey on the basic working principle of clouding computing. This paper provides an overview of the cloud architecture including the different types and level of clouds services. In this paper focus has been made upon the service level agreement, issue and security prospectus over the cloud computing. Keywords: Architecture, Cloud Computing, Cloud Security, Cloud Services Service Level Agreements
Data Stream Controller for Enterprise Cloud ApplicationIJSRD
Cloud computing is an emerging computing paradigm where computing resources are provided as services over Internet while residing in a large data center. Even though it enables us to dynamically provide servers with the ability to address a wide range of needs, this paradigm brings forth many new challenges for the data security and access control as users outsource their sensitive data to clouds, which are beyond the same trusted domain as data owners. The occupier need not be concerned with how the Paas system achieves expansion under high load.MAC systems differ as security policy is defined for the entire system, typically by administrators. Information flow control (IFC) is a MAC approach, developed originally from military information management methodologies. IFC can be used to enforce more general policies, using appropriate labeling and checking schemes. The labels can be used to manage both confidentiality and integrity concerns, tracking “secrecy†and “quality†of data, respectively. Decentralized Information Flow Control (DIFC) is an approach to security that allows application writers to control how data flow between the pieces of application and the outside world. As applied to privacy DIFC allows un trusted software to compute with private data while trusted security code controls the release of that data. As applied to integrity DIFC allows trusted code to protect un trusted software from unexpected inputs.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Information security plays an important role in
governments. Its realm has been increased nowadays, especially
with resent viruses’ attacks in different governmental
organizations. The authentication is aspect of information
security, its current scheme used nowadays in the systems is
depend on the login by user name and password in addition to
one-time password or traditional secret questions, which in turn
is usually easy to predicate. This paper proposes enhanced
knowledge based authentication solution which ensures and
provides more security and usability levels for governmental
organizations.
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...iosrjce
Cloud computing is an important transition that makes change in service oriented computing
technology. Cloud service provider follows pay-as-you-go pricing approach which means consumer uses as
many resources as he need and billed by the provider based on the resource consumed. CSP give a quality of
service in the form of a service level agreement. For transparent billing, each billing transaction should be
protected against forgery and false modifications. Although CSPs provide service billing records, they cannot
provide trustworthiness. It is due to user or CSP can modify the billing records. In this case even a third party
cannot confirm that the user’s record is correct or CSPs record is correct. To overcome these limitations we
introduced a secure billing system called THEMIS. For secure billing system THEMIS introduces a concept of
cloud notary authority (CNA). CNA generates mutually verifiable binding information that can be used to
resolve future disputes between user and CSP. This project will produce the secure billing through monitoring
the service level agreement (SLA) by using the SMon module. CNA can get a service logs from SMon and stored
it in a local repository for further reference. Even administrator of a cloud system cannot modify or falsify the
data.
Cloud Computing & ITSM - For Better of for Worse?ITpreneurs
his article explores the question whether the relationship will be “a marriage made in heaven?” It also explores the issue of “who is the bride and who is the groom?” As you read further, you can also decide whether the relationship between Cloud Computing and ITSM is “for better or for worse?”
(SEC404) Incident Response in the Cloud | AWS re:Invent 2014Amazon Web Services
You've employed the practices outlined for incident detection, but what do you do when you detect an incident in the cloud? This session walks you through a hypothetical incident response on AWS. Learn to leverage the unique capabilities of the AWS environment when you respond to an incident, which in many ways is similar to how you respond to incidents in your own infrastructure. This session also covers specific environment recovery steps available on AWS.
Public cloud's are going to crash. It's inevitable. The best thing you can do is be prepared with a highly available architecture to ensure you're not affected by the outage. Join a live webinar with Gigaspaces founder and CTO Nati Shalom to discuss best practices in high availability to safe guard your cloud from the inevitable outage.
http://www.newvem.com/cloud-webinar-safe-guard-your-application-from-outages/
Building cross-region and cross could high availability into your app, a real life use case by Gigaspaces, Nati Shalom, Funder & CTO, Gigaspaces
Achieving high levels of availability and disaster recovery in a cloud environment requires the implementation of patterns and practices that introduce redundancy through multi-zone, multi-region, and multi-cloud deployments. As we move towards implementing higher availability, we cannot escape the direct increase in the accidental complexity of the deployment architecture resulting from lack of cloud portability and deployment lifecycle automation. We present how high availability and disaster recovery were achieved in reality by using the Cloudify open source framework on top of AWS. This approach applies to not just AWS but also other public clouds and private cloud environments such as Eucalyptus. The resulting reference architecture provides portable PostgreSQL replication and disaster recovery as well as application tier scalability across zones, regions, and public/private clouds through a unified deployment workflow.
https://masterclass.etiennegarbugli.com
This presentation was voted Most Liked presentation of the year by SlideShare. In December 2013, 26 Time Management Hacks I Wish I'd Known at 20 was included in the Slideshare Zeitgeist.
SelCSP: A Framework to Facilitate Selection of Cloud Service Providers1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
With the recent increase demand for cloud services, handling clients’ needs is getting increasingly
challenging. Responding to all requesting clients with no exception could lead to security breaches, and
since it is the provider’s responsibility to secure not only the offered cloud services but also the data, it is
important to ensure clients reliability. Although filtering clients in the cloud is not so common, it is
required to assure cloud safety.
In this paper, we made use of multi agent system interaction mechanisms to handle the cloud interactions
for the providers’ side, and of Particle Swarm Optimization to select the and determine the accurate trust
weight and therefore to filtrate the clients by determining malicious and untrustworthy clients. The
selection depends on previous knowledge and overall rating of trusted peers. The conducted experiments
proves that the combination between MAS, PSO and trust outputs relevant results with different number of
peers, the solution is able to converge to the best result after small number of iterations. To explore more
space and scenarios, synthetic data was generated to improve the model’s precision .
Cloud Armor: A Conclusion Work on Trust Management SystemIJAEMSJORNAL
Distributed computing gives Software as service (Saas) ,Platform as service(Paas) and Infrasrtucture as a service(Iaas).Cloud figuring condition having a few issues like protection and security. Trust administration is a standout amongst the most difficult issue. Shielding a specific cloud benefit from a few assaults like agreement attack(Such as client may give misdirecting criticism about specific cloud services)and Sybil attack(such as a solitary client can make numerous accounts..i.,e noxious user).In this paper we talk about cloudarmor that gives notoriety based trust administration to cloud administrations. A notoriety based trust administration system gives set of functionalities to convey Trust as a service(Taas) . Taas incorporates i)Zeroknowledge believability evidence convention to demonstrate validity of the consumers criticism and jam client security, ii)a validity show it will measures te validity of input to shield cloud administrations from malevolent client. what's more, iii)an accessibility model to deal with the accessibility of the trust administration.
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGijsptm
In the digital world using technology and new technologies require safe and reliable environment, and it also requires consideration to all the challenges that technology faces with them and address these challenges. Cloud computing is also one of the new technologies in the IT world in this rule there is no exception. According to studies one of the major challenges of this technology is the security and safety required for providing services and build trust in consumers to transfer their data into the cloud. In this paper we attempt to review and highlight security challenges, particularly the security of data storage in a cloud environment. Also, provides some offers to enhance the security of data storage in the cloud
computing systems that by using these opinions can be overcome somewhat on the problems.
Trust models for Grid security environment – Authentication and Authorization methods – Grid security infrastructure – Cloud Infrastructure security: network, host and application level – aspects of data security, provider data and its security, Identity and access management architecture, IAM practices in the cloud, SaaS, PaaS, IaaS availability in the cloud, Key privacy issues in the cloud.
A traditional computing environment requires a costly
infrastructure to offer a better service to users. The introduction
of cloud computing has changed the working environment from
traditional to virtual. A larger number of IT companies are
utilizing the cloud. On the one hand, the cloud attracts more
number of consumers by offering services with minimized
capital cost and virtual infrastructure. On the other hand, there
are a risk and security challenges in cloud computing that
makes the user not to move completely towards it. The cloud
environment is more vulnerable to security breaches and data
theft. Moreover, insider attacks are more frequent in larger
enterprises. An unauthenticated user can cause more damage
to company reputation. The cloud service providers are trying
to provide a secure work environment for users. However,
there is a lack of global standards and policies to invoke
security measures in cloud computing. This study aims to
highlight and classify security challenges and trust issues in the
cloud environment.
The survey was conducted in various institutions and
governmental organizations in Saudi Arabia to study the
opinions of stakeholders on cloud computing security
challenges and risks.
Links:
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
Ubiquitous computing has revolutionized interaction of humans and machines. Cloud computing has been mainly used for storing data and various computational purposes. It has changed the face of using the internet. But, as we know every technology has its pros and cons. Securing cloud environment is the most challenging issue for the researchers and developers. Main aspects which cloud security should cover are authentication, authorization, data protection etc. Establishing trust between cloud service providers (CSP) is the biggest challenge, when someone is discussing about cloud security. Trust is a critical factor which mainly depends on perception of reputation and self-assessment done by both user and CSP. The trust model can act as security strength evaluator and ranking service for cloud application and services. For establishing trust relationship between two parties, mutual trust mechanism is reliable, as it does verification from both sides. There are various trust models which mainly focuses on securing one party i.e., they validate either user or service node. In this survey paper, the study of various trust models and their various parameters are discussed.
Enhancing Data Integrity in Multi Cloud StorageIJERA Editor
Cloud computing is a way to increase the capacity or add capabilities dynamically without investing in new infrastructure, training new personnel, or licensing new software. Cloud is surrounded by many security issues like securing data and examining the utilization of cloud by the cloud computing vendors. Security is one of the major issues which reduce the growth of cloud computing. A large number of clients or data owners store their data on servers in the cloud and it is provided back to them whenever needed. The data provided should not be jeopardized. Data integrity should be taken into account so that the data is correct, consistent and accessible. For ensuring the integrity in cloud computing environment, cloud storage providers should be trusted. Dealing with single cloud providers is predicted to become less secure with customers due to risks of service availability, failure and the possibility of malicious insiders in the single cloud. This paper deals with multi cloud environments to resolve these issues. The integrity of the data in multi cloud storage has been provided with the help of trusted third party using cryptographic algorithm.
Preferences Based Customized Trust Model for Assessment of Cloud ServicesIJECEIAES
In cloud environment, many functionally similar cloud services are available. But, the ser- vices differ in Quality of Service (QoS) levels, offered by them. There is a diversity in user requirements about the expected qualities of cloud services. Trust is a measure to understand whether a cloud service can adequately meet the user requirements. Consequently, trust assessment plays a significant role in selecting the suitable cloud service. This paper proposes preferences based customized trust model (PBCTM) for trust assessment of cloud services. PBCTM takes into account user requirements about the expected quality of services in the form of preferences. Accordingly, it performs customized trust assessment based on the evidences of various attributes of cloud service. PBCTM enables elastic trust computation, which is responsive to dynamically changing user preferences with time. The model facilitates dynamic trust based periodic selection of cloud services according to varying user preferences. Experimental results demonstrate that the proposed preferences based customized trust model outperforms the other model in respect of accuracy and degree of satisfaction.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...IJERA Editor
Cloud computing, undoubtedly, is a path to expand the limits or add powerful capabilities on-demand with
almost no investment in new framework, training new staff, or authorizing new software. Though today
everyone is talking about cloud but, organizations are still in dilemma whether it’s safe to deploy their business
on cloud. The reason behind it; is nothing but Security. No cloud service provider provides 100% security
assurance to its customers and therefore, businesses are hesitant to accept cloud and the vast benefits that come
along with it. The absence of proper security controls delimits the benefits of cloud. In this paper, a review on
different cloud service models and a survey of the different security challenges and issues while providing
services in cloud is presented .The paper focuses on the security issues specific to service delivery model (SaaS,
IaaS and PaaS) of cloud environment. This paper also explores the various security solutions currently being
applied to protect cloud from various kinds of intruders.
Cloud has major security challenges which can be a nightmare for any organization or clients. This paper published in IEEE discusses the cloud implementation security challenges with greater details. It is really a good reference for cloud security and privacy researchers.
A Question of Trust: How Service Providers Can Attract More Customers by Deli...SafeNet
Offering an outsourced, elastic, pay-as-you-go computing infrastructure, cloud computing services can deliver clear cut benefi ts to a host of companies. Today, however, security concerns are a big barrier to many clients’ adoption of cloud services. To boost market share and gain competitive distinction, cloud service providers need to add the security infrastructure that safeguards clients’ sensitive data and fosters trust. This white paper outlines the path cloud providers can take to start building trust into cloud deployments, and details the approaches and capabilities organizations need to make this transition a reality.
Cloud Computing is the most emerging trend in Information Technology now days. It is attracting the organizations due to its advantages of scalability, throughput, easy and cheap access and on demand up and down grading of SaaS, PaaS and IaaS. Besides all the salient features of cloud environment, there are the big challenges of privacy and security. In this paper, a review of different security issues like trust, confidentiality, authenticity, encryption, key management and resource sharing are presented along with the efforts made on how to overcome these issues.
Similar to Analyzing and Surveying Trust In Cloud Computing Environment (20)
An Examination of Effectuation Dimension as Financing Practice of Small and M...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Does Goods and Services Tax (GST) Leads to Indian Economic Development?iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Childhood Factors that influence success in later lifeiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Customer’s Acceptance of Internet Banking in Dubaiiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Consumer Perspectives on Brand Preference: A Choice Based Model Approachiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Student`S Approach towards Social Network Sitesiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Broadcast Management in Nigeria: The systems approach as an imperativeiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Study on Retailer’s Perception on Soya Products with Special Reference to T...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladeshiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Media Innovations and its Impact on Brand awareness & Considerationiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Customer experience in supermarkets and hypermarkets – A comparative studyiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Social Media and Small Businesses: A Combinational Strategic Approach under t...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Implementation of Quality Management principles at Zimbabwe Open University (...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Analyzing and Surveying Trust In Cloud Computing Environment
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. 1 (May – Jun. 2015), PP 66-70
www.iosrjournals.org
DOI: 10.9790/0661-17316670 www.iosrjournals.org 66 | Page
Analyzing and Surveying Trust In Cloud Computing
Environment
Kavita Rathi1,
Sudesh Kumari2.
Assistant Professor, CSE Department,
Deenbandhu Chhotu Ram University of Science & Technology, Murthal.
Student, M.Tech(CSE),
Deenbandhu Chhotu Ram University of Science & Technology, Murthal.
Abstract: Cloud computing is the most discussed research area now-a-days which helps to provide elasticity
and flexibility in using the computing resources and services to fulfill the requirement of current businesses.
Besides many advantages offered by cloud computing, it deals with many obstacles in the path of its growth,
that are security issues, data privacy issues and distrust on cloud service providers (CSP). Trust is found to be
an essential element for achieving security and confidence in the use of distributed computing. Various issues
like data control, ownership, data integrity and security can be considered as important parameters of trust.
This paper addresses the existing trust models for trust establishment in cloud services and also tries to find out
the shortcomings of these models.
Keywords- Trust, Issues of Trust, Trust Models, User Based Trust Models.
I. Introduction
Cloud Computing is a model for enabling ubiquitous, convenient, on-demand network access to shared
pool of configurable computing resources (network, server, storage, application and services) that can rapidly
provisioned and released with minimum management effort or service provider interaction[1]-[3]. It comes up
with several advantages in distributed computing environments and operates on a virtualized and “pay-as-you-
go” economic model [4], it also brings various challenges in its adoption. Trust is found to be one of the major
challenges in the adoption of cloud computing as distrust prevents the consumers from its wide use and distrust
comes out most because consumers do not have a direct control over their data lying on the cloud. This is the
reason why evaluation of trust is critical. Trust has many dimensions, multiple faces and is also
multidisciplinary and hence it is very difficult to give a proper definition to it. This paper is organized in the
sections as described. The first section presents the theory for the need of trust in the cloud services, followed by
the sections focusing on trust issues and existing trust models along with their shortcomings in trust
establishment.
II. Need Of Trust
Trust is a social problem, not a purely technical issue [5]. Trust is viewed as a measurable belief that
utilizes experience to make trustworthy decisions [6]. The cloud service users (CSU) always have to keep trust
on the cloud service providers (CSP) and the CSPs have to keep trust on the CSUs for a healthy establishment of
cloud services. In the cloud computing scenarios the CSUs give all their digital resources in the hands of the
CSPs and the CSPs hold direct control over almost all the security factors. This is the reason why a CSP has to
confer a proper level of trust to the cloud service users. The component of trust is an essential element in the
wide use and implementation of cloud services. The relationship of trust is established between the two parties
which are stated as trustor and trustee. The trustor is the person or entity who holds confidence, belief,
reliability, integrity and ability, etc. of another person or thing which is the object of trust, i.e. the trustee [7]. As
per the previous study, following trust characteristics are found:-
Trustor and Trustee[8]
The trust relation is formed by the trustor that is the trusting party and the trustee that is the party which
is to be trusted. The development of trust is based on the ability of the trustee to act in the best interest of the
trustor and degree of trust that the trustor places on the trustee [8].
Susceptible to attack
Trust is found to be important in the computing environments where there are more possibilities of risk,
data losses, vulnerabilities and uncertainty. Due to this reason trust is important in cloud computing
environments. A trustor depends on the trustee for not exploiting and misusing his vulnerabilities.
2. Analyzing And Surveying Trust In Cloud Computing Environment
DOI: 10.9790/0661-17316670 www.iosrjournals.org 67 | Page
Produced actions[8]
Trust between the trustor and trustee leads to various behavioral changes in the actions of the CSUs.
Trust allows the CSUs to take risk and allow their private data to be shared on the cloud. It may also allow the
CSUs to continue the use of services of the cloud on a regular basis.
Subjective Nature
Trust is subjective and every individual or enterprise has their own opinions towards the follow up of
any technology. Hence there are different requirements of every CSU to judge the trust level of a particular
CSP.
III. Trust Issues
There are many aspects of trust in the cloud computing environment based on the CSPs view and the
CSUs view. Trust is very important for building relationships between CSUs and CSPs. There are several issues
of trust which are categorized by considering following factors:-
How can trust be defined and evaluated in the cloud computing scenarios.
How malicious information can be handled in temporary and dynamic cloud relationships.
How to consider and provide different security levels according to trust degree [6].
How to manage trust degree change with temporary and dynamic relationships [6].
As per the researchers Ankush Dhiman, Mauli Joshi, Wayne A. Jansen, several trust issues are found, a few are
stated below:-
1. Access by Insiders: All the data of the CSUs is stored to the data centers of the CSPs and then the storing
and processing of data depends purely on the service providers. The employees of the service providers could
see and process the data as they want and there is always high risk of data access by insiders. They could make
changes or modifications to the data. Denial of service attack, and creation of 20 account and instance to each
account launched a Virtual machine for each and again process continued, to set the resource beyond the limit
are some special cases of the malicious insider attack[3]. It is one of the examples of such attacks studied in the
Amazon Elastic Compute Cloud (EC2)[3].
2. Nesting of Services: This issue includes the use of two or more CSPs. This means that a software as a service
provider uses the services of platform as a service provider and platform as a service provider uses another
infrastructure as a service provider. In this way, there are multiple levels of hiring and renting the services in a
cloud. Liability and performance guarantees are the serious issues that come into account with the composite
cloud services [1][3]. An example of such type is LinkUp which is an online storage service which leaded to the
loss of access to the significant data of its 20,000 customers [1][3]. It happened because another company
named Nirvanix hosted the data for LinkUp and another company named Savvis hosted the application and
database for Nirvanix [1][3]. In these situations there is no provider to take responsibility for losses of data and
hence this becomes one of the major issues of establishing trust on third party distributers of the cloud services.
3. Degree of Exposure: This issue deals with the level of visibility provided by the CSPs to the CSUs. The
detailed network and system, network and storage level monitoring should be implemented for gaining visibility
into the security controls and processes employed by the CSP along with their performance over time [3].
4. Risk: Assessing and managing risk in systems using cloud services is again a challenge to be taken.
Sometimes consumers are ready to take risk if the control over processes and equipment is towards their end.
But in case of cloud services the scenario changes as the control varies. The trust is based on the amount of
direct control that any organization is capable of applying on the CSP’s with regard to the security employed for
the protection of services [3]. Verifying the correct functioning of the system along with the security controls is
an important aspect of establishing trust in the cloud services [3]. Risk management and assessment must be
detailed and should be done properly in a cloud based implementation.
IV. Trust Models In Cloud
Trust is the most complex relationship among entities, because it is subjective and difficult to be
evaluated [9]. Trust models are considered as a methodology that helps to evaluate trust on the CSP’s or the
third party distributers that are providing the cloud services. Trust models in Cloud computing are very diverse
in a way that each model supports different features and evaluates Cloud services on the basis of different
parameters and requirements [10].
3. Analyzing And Surveying Trust In Cloud Computing Environment
DOI: 10.9790/0661-17316670 www.iosrjournals.org 68 | Page
Figure 1[11] states the various trust models that have been proposed based on the functionality of their
evaluation criteria among different levels of services provided by the cloud computing environments.
Figure1 [11]. Trust Models in Cloud Computing
Abbreviations used in Figure1 denote the following:-
SLA: Service Level Agreement
TVEM: Trusted Virtual Environment Module
PLT: Prepositional Logic Terms
There are various trust models that can be seen in the diagram stated above. Out of these this paper
focuses on the study of user behavior based trust models as basically when we think of trust it is only about the
consumer trusting the CSP but it is equally important to judge the user for its trustworthiness for using the cloud
services. In cloud computing, due to users directly use and operate the software and operating system, so the
impact and destruction for the software and hardware cloud resources are worse than the current internet users
who use it to share resources [12]. This makes it important to check the user for its reliability to provide access
to the use of cloud resources and also keep track of the fact that the feedback comes out from correct and
authenticated group of CSUs. Trust is found to be two way which deals with trust from both the CSUs on CSPs
and vice versa.
Some of the reasons that lead to distrust in the use of cloud services are:-
Risk of data leaks.
Security risks of stored data location.
Risk of data to be investigated.
Interruptions in cloud services.
Risk of data damage.
Risk of collapse of the CSP.
These reasons focus on the trust of the CSU on the CSP. Though the consumers trust the CSPs for their
work, it does not ensure the safety of data as the consumer may also be malicious. It is very important to detect
such kind of CSUs and not allow them to use the cloud services. They could make fake identifications and be in
the cloud and put some malicious data to the cloud which could lead to the blockage of various cloud services to
other CSUs. The possible reasons leading to user behavior mistrust are [14]:-
Destructive behavior by individuals towards their business counterparts or commercial competitors or some
persons.
Damage to the cloud resources consisting of software services, platform services, infrastructure and
hardware services by the errors caused by users or in configurations.
Detection of malicious code or software in the cloud.
4. Analyzing And Surveying Trust In Cloud Computing Environment
DOI: 10.9790/0661-17316670 www.iosrjournals.org 69 | Page
Errors in the authentication and identification of users.
Whatever is the reason of mistrust in CSU, there must be proper monitoring by the CSP on the
behavior of CSUs so that it could be ensured that the cloud services are only used by the trustworthy users.
Cloud computing model brings some new security threats such as resource sharing, fate sharing, and data lock in
[13]. These risks are sources of concern for users and prevent them from using cloud computing [13]. Due to
these kinds of risks, the CSPs have to keep concern for the CSUs to provide them with a trustworthy cloud
environment. Several researchers have given many elements of trust that are useful in identifying the CSUs’
trust in the use of cloud services. As formulated in [13]-[16], following trust elements of CSUs are compiled as
given below:-
Location of stored data: In the cloud environments, data can be stored anywhere and the CSUs are not
aware of the physical location of data which is a concern of trust.
Data to be investigated: The data is shared and stored at different locations hence it becomes very difficult
to convince the CSUs against any unnecessary action to be taken on their data by anyone.
Sharing of data: How the data is distributed over the cloud and how it is protected is a major concern for
the CSUs.
Availability of Services: The cloud services must be available to the CSUs whenever they want and they
must be available round the clock.
Long-term Viability: CSUs want their data to be available and viable to them for long and hence they want
that the CSP must not go down and nothing wrong should happen to their data. Ideally, cloud computing
provider should never go broke or get acquired by a larger company. But user must be assured about the
data will remain available even after such an event [13].”
Compliance regulation and audit: Compliance includes correspondence of the appearance of the
constitute specifications, standards and Law [6]. These laws, rules and regulations for security and privacy
differ from location to location [6]. Each country, state, local bodies have their own rules and regulation. So
the compliance is one of the most important issues in cloud computing [6].
Back up of data and Recovery: A CSP must have the techniques to recover data losses in case of any
disaster or any other circumstance that may lead to loss of data.
Access privileges to the Users: CSPs must have a proper mechanism to assign the access privileges to
different kinds of users in the cloud data center and access control of data must be civilized and
authenticated.
Governance: The cloud resources are spread and shared all over the globe and hence it is very important to
decide the protocols and governing body of the CSPs is working independent of the political conditions of a
particular country.
Transparency: The CSP should display the relevant information about its policies and conditions for using
the cloud services and these should be transparent to the CSUs through a proper design of its web interface
and graphics. Also the CSPs must communicate with the CSUs through video conferencing or other
communication media while assigning the resources to a CSU. The transparent way of customer dealing by
a CSP will help the CSP to gain more user confidence and trust.
These are some of the major trust elements that are useful for the CSUs to evaluate trust of the CSPs.
The CSPs that provide more information about all these elements are found to be trustworthy and their services
are considered to be used by more CSUs. Only the trust of the CSP is not enough but the trust of the CSU is
equally important for a healthy cloud computing environment. From [12] and [14] the basic principles for
evaluation of user trust are found to be as stated below:-
Effect of Expired User: The user that is not using the cloud for a long time and is very old is not
considered for evaluating trust of the user behavior.
5. Analyzing And Surveying Trust In Cloud Computing Environment
DOI: 10.9790/0661-17316670 www.iosrjournals.org 70 | Page
Evaluation of trust based on records: The recent records of behavior of user in using cloud services are
considered to be more fruitful as compared to the older records. If the user is accessing its own domain and
has a behavior which is predictable is considered less useful and important in evaluating the trust of user.
On the other hand, if the user has a unpredictable and unusual access to cloud resources, this record makes
more influence in evaluating the user trust.
Repetitive access to cloud resources by user: If the user accesses the cloud resources less frequently then
it is difficult to evaluate its behavior, while more user access gives more significant results to predict its
behavior whether user is trustworthy or not.
Actions based on analysis: There must be proper strategies to punish the non-trustful behaviors. On
analyzing the behavior of users whether found to be trustful the a trust value assigned is higher and user is
found to be trustworthy to continue with the cloud services and if the trust value is found lower than some
standard value defined then the user has to be discontinued from the cloud services and also must be
blocked for future.
The models in [13],[14],[15],[16] are found to be missing transparency as a trust element and also they
are basically theory based which do not provide some parameters to calculate the trust values for the user trust
evaluation. The model in [14] is policy based and evaluates the user behavior based on the login of the users and
its response become slower when registered users increase in number. Another limitation is found to be the fact
that if user access is less and not repetitive then the result shown is not representative and stable.
V. Conclusion And Future Work
This paper gives an overview of the various trust issues and trust models. The main focus is on the
users’ trust based models which describe the importance of trustworthy users as well as trustworthy CSPs for a
healthy cloud computing environment. The main trust elements are found as data backup and recovery, storage
location of data, availability of services and transparency. Most of the models are found to be ignoring
transparency and regular updates to users regarding any changes towards CSPs’ end as elements of user trust.
Most models that exist, focus on the trustworthiness of the cloud service providers and less work is done
towards the evaluation of checking out the trustworthiness of the user who is using the cloud services. Lot of
research is possible in this direction in future.
References
[1]. Ankush Dhiman, Mauli Joshi, “Analysis of Performance for Data Center under for Private Cloud through Cloud Computing”,
International Journal of Engineering and Computer Science(IIECS) issn:2319-7242, vol.3 Issue 6, Page. 6422-6431, June 2014.
[2]. Hong Cai, Ning Wang, Ming Jun Zhou, “A Transparent Approach of Enabling SaaS Multi-tenancy in the Cloud”, IEEE 6th World
Congress on Services, 2010.
[3]. Wayne A. Jansen, NIST, “Cloud Hooks: Security and Privacy Issues in Cloud Computing”, Proceedings of the 44th
Hawaii
International Conference on System Sciences, 2011.
[4]. Michael Armbrust, Armando Fox, et al., “A view of Cloud Computing”, Communications of the ACM, vol. 53, April 2010.
[5]. Kai Hwang, Deyi Li, “Trusted Cloud Computing with Secure Resources and Data Coloring”, IEEE Internet Computing, 2010.
[6]. Dawei Sun, Guiran Chang, Lina Sun, Xingwei Wang, “Surveying and Analyzing Security, Privacy and Trust Issues in Cloud
Computing Environments”, Advanced in Control Engineering and Information Science, Procedia Engineering 15, page. 2852-2856,
2011.
[7]. Yashashree Bendale, Seema Shah, “Feasibility of User Level Trust in Cloud Computing”, UACEE International Journal of
Computer Science and its Applications, vol.2 : issue2[ISSN 2250-3765].
[8]. Felix Meixner, Ricardo Buettner, “Trust as an Integral Part for Success of Cloud Computing”, ICIW 2012: The Seventh
International Conference on Internet and Web Applications and Services, 2012.
[9]. Qiang Guo, Dawei Sun, Guiran Chang, Lina Sun, Xingwei Wang, “Modeling and Evaluation of Trust in Cloud Computing
Environments”, 3rd International Conference on Advanced Computer Control (ICACC), 2011.
[10]. Xiaoyong Li, Junping Du, “Adaptive and Attribute based Trust model for service-level agreement guarantee in cloud computing”,
IET Information Security, 2012.
[11]. Ayesha Kanwal, Rahat Masood, Um E Ghazia, Muhammad Awais Shibli and Abdul Ghafoor Abbasi, “Assessment Criteria for
Trust Models in Cloud Computing”, IEEE International Conference on Green Computing and Communications and IEEE Internet
of Things and IEEE Cyber, Physical and Social Computing, 2013.
[12]. Tian Li-qin, LIN Chuang, Ni Yang, “Evaluation of User Behavior Trust in Cloud Computing”, 2010 International Conference on
Computer Application and System Modeling (ICCASM 2010).
[13]. Ahmad Rashidi and Naser Movahhedinia, “A model for User Trust in Cloud Computing”, International Journal on Cloud
Computing: Services and Architecture (IJCCSA), Vol. 2, No.2, April 2012.
[14]. Yashashree Bendale, Seema Shah, “User Level Trust Evaluation in Cloud Computing”, International Journal of Computer
Applications, Vol. 69-No.24, May 2013.
[15]. Shakeel Ahmad, Basir Ahmad, Sheikh Muhammad Saqib and Rashid Muhammad Khattak, “Trust Model: Cloud’s Provider and
Cloud’s User”, International Journal of Advanced Science and Technology, Vol. 44, July 2012.
[16]. EY Building trust in the Cloud, Insights on governance, risk and compliance, June 2014.