International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Cloud Computing Basics Features and Servicesijtsrd
Cloud computing is an on demand service in which distributed resources, information, software and other devices are provided according to the client's requirement at specific time 1 . Cloud computing involves deploying groups of remote servers and software networks that allow centralized data storage and online access to computer services or resources. In this paper, we explore the different services in different computing platforms and applications. Cloud computing is a service, which offers customers to work over the internet 2 . Kyi Pyar | Me Me Khaing "Cloud Computing Basics: Features and Services" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd27960.pdfPaper URL: https://www.ijtsrd.com/computer-science/distributed-computing/27960/cloud-computing-basics-features-and-services/kyi-pyar
Cloud computing is very useful then also its own set of cons discourage cloud users to choose them as a best option. The multitenant architecture of cloud exposed to several threats such as improper trust management at service provider site, Storage security, Shared technology vulnerabilities, data lost/leakage during transit, unauthorized access of data. This paper studied review work on cloud steganography.
Abstract--The paper identifies the issues and the solution to overcome these problems. Cloud computing is a subscription based service where we can obtain networked storage space and computer resources. This technology has the capacity to admittance a common collection of resources on request. It is the application provided in the form of service over the internet and system hardware in the data centers that gives these services. But having many advantages for IT organizations cloud has some issues that must be consider during its deployment. The main concern is security privacy and trust. There are various issues that need to be dealt with respect to security and privacy in a cloud computing scenario [4].
Keywords--Cloud, Issues, Security, Privacy, Resources, Technology.
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
in cloud computing data storage is a significant issue
because the entire data reside over a set of interconnected
resource pools that enables the data to be accessed through
virtual machines. It moves the application software’s and
databases to the large data centers where the management of
data is actually done. As the resource pools are situated over
various corners of the world, the management of data and
services may not be fully trustworthy. So, there are various
issues that need to be addressed with respect to the
management of data, service of data, privacy of data, security
of data etc. But the privacy and security of data is highly
challenging. To ensure privacy and security of data-at-rest in
cloud computing, we have proposed an effective and a novel
approach to ensure data security in cloud computing by means
of hiding data within images following is the concept of
steganography. The main objective of this paper is to prevent
data access from cloud data storage centers by unauthorized
users. This scheme perfectly stores data at cloud data storage
centers and retrieves data from it when it is needed.
Cloud computing is basically storing and accessing data and sharing resources over the internet rather than having local servers or personal device to handle applications.
“This chapter provide an overview of introductory cloud computing topics. It begins with a brief history of cloud computing along with short descriptions of its business and technology drivers. This is followed by definitions of basic concepts and terminology, in addition to explanations of the primary benefits and challenges of cloud computing adoption.”
Cloud Computing Basics Features and Servicesijtsrd
Cloud computing is an on demand service in which distributed resources, information, software and other devices are provided according to the client's requirement at specific time 1 . Cloud computing involves deploying groups of remote servers and software networks that allow centralized data storage and online access to computer services or resources. In this paper, we explore the different services in different computing platforms and applications. Cloud computing is a service, which offers customers to work over the internet 2 . Kyi Pyar | Me Me Khaing "Cloud Computing Basics: Features and Services" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd27960.pdfPaper URL: https://www.ijtsrd.com/computer-science/distributed-computing/27960/cloud-computing-basics-features-and-services/kyi-pyar
Cloud computing is very useful then also its own set of cons discourage cloud users to choose them as a best option. The multitenant architecture of cloud exposed to several threats such as improper trust management at service provider site, Storage security, Shared technology vulnerabilities, data lost/leakage during transit, unauthorized access of data. This paper studied review work on cloud steganography.
Abstract--The paper identifies the issues and the solution to overcome these problems. Cloud computing is a subscription based service where we can obtain networked storage space and computer resources. This technology has the capacity to admittance a common collection of resources on request. It is the application provided in the form of service over the internet and system hardware in the data centers that gives these services. But having many advantages for IT organizations cloud has some issues that must be consider during its deployment. The main concern is security privacy and trust. There are various issues that need to be dealt with respect to security and privacy in a cloud computing scenario [4].
Keywords--Cloud, Issues, Security, Privacy, Resources, Technology.
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
in cloud computing data storage is a significant issue
because the entire data reside over a set of interconnected
resource pools that enables the data to be accessed through
virtual machines. It moves the application software’s and
databases to the large data centers where the management of
data is actually done. As the resource pools are situated over
various corners of the world, the management of data and
services may not be fully trustworthy. So, there are various
issues that need to be addressed with respect to the
management of data, service of data, privacy of data, security
of data etc. But the privacy and security of data is highly
challenging. To ensure privacy and security of data-at-rest in
cloud computing, we have proposed an effective and a novel
approach to ensure data security in cloud computing by means
of hiding data within images following is the concept of
steganography. The main objective of this paper is to prevent
data access from cloud data storage centers by unauthorized
users. This scheme perfectly stores data at cloud data storage
centers and retrieves data from it when it is needed.
Cloud computing is basically storing and accessing data and sharing resources over the internet rather than having local servers or personal device to handle applications.
“This chapter provide an overview of introductory cloud computing topics. It begins with a brief history of cloud computing along with short descriptions of its business and technology drivers. This is followed by definitions of basic concepts and terminology, in addition to explanations of the primary benefits and challenges of cloud computing adoption.”
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
Cloud computing provides the facility to access shared resources and common support which contributes services on demand over the network to perform operations that meet changing business needs. A cloud storage system, consisting of a collection of storage servers, affords long-term storage services over the internet. Storing the data in a third party cloud system cause serious concern over data confidentiality, without considering the local infrastructure limitations, the cloud services allow the user to enjoy the cloud applications. As the different users may be working in the collaborative relationship, the data sharing becomes significant to achieve productive benefit during the data accessing. The existing security system only focuses on the authentication; it shows that user’s private data cannot be accessed by the fake users. To address the above cloud storage privacy issue shared authority based privacy-preserving authentication protocol is used. In the SAPA, the shared access authority is achieved by anonymous access request and privacy consideration, attribute based access control allows the user to access their own data fields. To provide the data sharing among the multiple users proxy re-encryption scheme is applied by the cloud server. The privacy-preserving data access authority sharing is attractive for multi-user collaborative cloud applications.
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
Cloud computing provides the facility to access shared resources and common support which contributes services on
demand over the network to perform operations that meet changing business needs. A cloud storage system, consisting of a collection
of storage servers, affords long-term storage services over the internet. Storing the data in a third party cloud system cause serious
concern over data confidentiality, without considering the local infrastructure limitations, the cloud services allow the user to enjoy the
cloud applications. As the different users may be working in the collaborative relationship, the data sharing becomes significant to
achieve productive benefit during the data accessing. The existing security system only focuses on the authentication; it shows that
user’s private data cannot be accessed by the fake users. To address the above cloud storage privacy issue shared authority based
privacy-preserving authentication protocol is used. In the SAPA, the shared access authority is achieved by anonymous access request
and privacy consideration, attribute based access control allows the user to access their own data fields. To provide the data sharing
among the multiple users proxy re-encryption scheme is applied by the cloud server. The privacy-preserving data access authority
sharing is attractive for multi-user collaborative cloud applications.
Cloud infrastructure mechanisms are foundational building blocks of cloud environments that establish primary artifacts to form the basis of fundamental cloud technology architecture.
Establishing applications on on-demand infrastructures rather of building applica-tions on fixed and rigid infrastructures was provided by cloud computing provides. By merely exploiting into the cloud, initiatives can gain fast access to business applications or infrastructure resources with decreased Capital Expenditure (CAPEX). The more and more information is placed into the cloud by someone and initiatives, security issues begins to develop and raised. This paper discusses the different security issues that rise up about how secure the mo-bile cloud computing environment.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
The Most great challenging in Cloud computing is Security. Here Security plays key role
in this paper proposed concept mainly deals with security at the end user access. While coming to the
end user access that are connected through the public networks. Here the end user wants to access his
application or services protected by the unauthorized persons. In this area if we want to apply
encryption or decryption methods such as RSA, 3DES, MD5, Blow fish. Etc.,
Whereas we can utilize these services at the end user access in cloud computing. Here there is
problem of encryption and decryption of the messages, services and applications. They are is lot of
time to take encrypt as well as decrypt and more number of processing capabilities are needed to use
the mechanism. For that problem we are introducing to use of cloud computing in SaaS model. i.e.,
scalable is applicable in this area so whenever it requires we can utilize the SaaS model.
In Cloud computing use of computing resources (hardware and software) that are delivered as a
service over Internet network. In advance earlier there is problem of using key size in various
algorithm like 64 bit it take some long period to encrypt the data.
Review on Security Techniques using Cloud ComputingEditor IJCATR
Cloud Computing is the nascent technology which is based on Pay-Per-Use Model. Cloud computing is emerging as a
model of “Everything as a Service” (XaaS). Cloud Computing is computing paradigm where applications, data bandwidth and IT
services are provided over the Internet. Cloud Computing is a relatively new computing model that provides on demand business
and IT services over the Internet. The main concerns in adapting Cloud Computing is its security, different security risks that
affects the cloud environment in the area of confidentiality, Integrity and computing on data is thoroughly investigated
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
Cloud computing provides the facility to access shared resources and common support which contributes services on demand over the network to perform operations that meet changing business needs. A cloud storage system, consisting of a collection of storage servers, affords long-term storage services over the internet. Storing the data in a third party cloud system cause serious concern over data confidentiality, without considering the local infrastructure limitations, the cloud services allow the user to enjoy the cloud applications. As the different users may be working in the collaborative relationship, the data sharing becomes significant to achieve productive benefit during the data accessing. The existing security system only focuses on the authentication; it shows that user’s private data cannot be accessed by the fake users. To address the above cloud storage privacy issue shared authority based privacy-preserving authentication protocol is used. In the SAPA, the shared access authority is achieved by anonymous access request and privacy consideration, attribute based access control allows the user to access their own data fields. To provide the data sharing among the multiple users proxy re-encryption scheme is applied by the cloud server. The privacy-preserving data access authority sharing is attractive for multi-user collaborative cloud applications.
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
Cloud computing provides the facility to access shared resources and common support which contributes services on
demand over the network to perform operations that meet changing business needs. A cloud storage system, consisting of a collection
of storage servers, affords long-term storage services over the internet. Storing the data in a third party cloud system cause serious
concern over data confidentiality, without considering the local infrastructure limitations, the cloud services allow the user to enjoy the
cloud applications. As the different users may be working in the collaborative relationship, the data sharing becomes significant to
achieve productive benefit during the data accessing. The existing security system only focuses on the authentication; it shows that
user’s private data cannot be accessed by the fake users. To address the above cloud storage privacy issue shared authority based
privacy-preserving authentication protocol is used. In the SAPA, the shared access authority is achieved by anonymous access request
and privacy consideration, attribute based access control allows the user to access their own data fields. To provide the data sharing
among the multiple users proxy re-encryption scheme is applied by the cloud server. The privacy-preserving data access authority
sharing is attractive for multi-user collaborative cloud applications.
Cloud infrastructure mechanisms are foundational building blocks of cloud environments that establish primary artifacts to form the basis of fundamental cloud technology architecture.
Establishing applications on on-demand infrastructures rather of building applica-tions on fixed and rigid infrastructures was provided by cloud computing provides. By merely exploiting into the cloud, initiatives can gain fast access to business applications or infrastructure resources with decreased Capital Expenditure (CAPEX). The more and more information is placed into the cloud by someone and initiatives, security issues begins to develop and raised. This paper discusses the different security issues that rise up about how secure the mo-bile cloud computing environment.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
The Most great challenging in Cloud computing is Security. Here Security plays key role
in this paper proposed concept mainly deals with security at the end user access. While coming to the
end user access that are connected through the public networks. Here the end user wants to access his
application or services protected by the unauthorized persons. In this area if we want to apply
encryption or decryption methods such as RSA, 3DES, MD5, Blow fish. Etc.,
Whereas we can utilize these services at the end user access in cloud computing. Here there is
problem of encryption and decryption of the messages, services and applications. They are is lot of
time to take encrypt as well as decrypt and more number of processing capabilities are needed to use
the mechanism. For that problem we are introducing to use of cloud computing in SaaS model. i.e.,
scalable is applicable in this area so whenever it requires we can utilize the SaaS model.
In Cloud computing use of computing resources (hardware and software) that are delivered as a
service over Internet network. In advance earlier there is problem of using key size in various
algorithm like 64 bit it take some long period to encrypt the data.
Review on Security Techniques using Cloud ComputingEditor IJCATR
Cloud Computing is the nascent technology which is based on Pay-Per-Use Model. Cloud computing is emerging as a
model of “Everything as a Service” (XaaS). Cloud Computing is computing paradigm where applications, data bandwidth and IT
services are provided over the Internet. Cloud Computing is a relatively new computing model that provides on demand business
and IT services over the Internet. The main concerns in adapting Cloud Computing is its security, different security risks that
affects the cloud environment in the area of confidentiality, Integrity and computing on data is thoroughly investigated
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Presentación divulgativa sobre Smart Cities desde el punto de vista tecnológico realizada en Zaragoza en la sesión Tech me out! del Pint of Science 2015.
Presentación realizada en el track de infraestructuras del congreso MeetandTalk, de interesados en el sistema Wonderware, celebrado en Zaragoza en Mayo de 2015
Apresentação ministrada por André Coutinho, sócio-diretor da empresa de consultoria Symnetics, no Fórum de Inovação em Energia, em Curitiba, Paraná em 17 de novembro de 2010.
TURKONT LIVESTOCK SHIPPING
ULUSLARARASI CANLI HAYVAN DENIZ KARA HAVA NAKLIYATI
LIVESTOCK RUNNING LINES
CANLI HAYVAN NAKLIYATI HATLARIMIZ
AMERIKA BREZILYA URUGUAY ARJANTINE AVUSTRALYA TURKIYE
AVUSTRALYA ORTADOGU VE TURKIYE HATTINDA 6000 10.000 18.000 BUYUK BAS HAYVAN
20.000 90.000 VE 120.000 KAPASITELI KUCUK BAS HAYVAN TASIYICI GEMI
AMERIKA ORTADOGU VE TURKIYE HATTINDA 3000 5000 12.000 BUYUK BAS HAYVAN GEMISI
AVRUPA RUSYA ORTADOGU VE TURKIYE HATTINDA 1500 3500 5000 8000 BUYUK BAS HAYVAN KAPASITELI GEMILER CALISMAKTADIR.
LIVESTOCK VESSEL & AIR CRAFTS SHIPPING AND CHARTERING
LIVESTOCK RUNNING LINES
AMERICA BREZILYA URUGUAY ARJANTINE AVUSTRALIA TURKIYE
AVUSTRALYA MIDDLE EAST AND TURKIYE RANGE 6000 10.000 18.000 HEADS CATTLES
20.000 90.000 AND 120.000 HEAD CAPACITY SHEEPS CARRIAGE VESSELS
AMERICA MIDLE EAST AND TURKIYE LINE 3000 5000 12.000 HEAD CATTLES VESSEL
EUROPE RUSSIA MIDLE EAST AND TURKIYE LINE 1500 3500 5000 8000 HEAD CATTLES
CAPACITY VESSEL ARE RUNNING.
INTERNATIONAL LIVE AIRCRAFTS TRANSPORT
THE CAPACITY OF AIRCRAFTS are 150 HEAD 500 KG CATTLES OR 1600 HEAD
40 KG WEIGHT SHEEPS
GEMI UCAK VE TRAKLARLA CANLI HAYVAN NAKLIYATI ITHALAT VE IHRACATI
www.turkont.com www.nakliyateu.com
info@turkont.com turkont@hotmail.com
Skype:turkont
902165674420 902165673228 902165671019 Mob:905327653318
Kontakt Bilgilerimizden 08/24 bize direkt ulasabilirsiniz
CARGO AND LIVESTOCK EXPORT IMPORT
CARGO AND LIVESTOCK FULL AND PARCIEL SHIPPING
TURKONT SEA AIR LAND SHIPPING AND LOGISTICS
This is a literature survey about security issues and countermeasures on cloud computing. This paper discusses about an overview of cloud computing and security issues of cloud computing.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Security & privacy issues of cloud & grid computing networksijcsa
Cloud computing is a new field in Internet computing that provides novel perspectives in internetworking
technologies. Cloud computing has become a significant technology in field of information technology.
Security of confidential data is a very important area of concern as it can make way for very big problems
if unauthorized users get access to it. Cloud computing should have proper techniques where data is
segregated properly for data security and confidentiality. This paper strives to compare and contrast cloud
computing with grid computing, along with the Tools and simulation environment & Tips to store data and
files safely in Cloud.
A Novel Computing Paradigm for Data Protection in Cloud ComputingIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Security threat issues and countermeasures in cloud computingJahangeer Qadiree
Cloud computing field has reached to the highest level of technical heights. The security problems of cloud computing hinders
its development. It is totally internet based technology where the resources and information shared on a distributed network. So
it is important for both provider as well as consumer to provide the security and trust to share the data for developing clou d
computing applications. Because now organizations are now moving fast towards the cloud. So there is the possibility of threats
that will harm the data on the cloud. In our paper we mainly focuses on security threats of cloud computing system also we
mention some solutions and countermeasures on these security problems
Load Balancing In Cloud Computing:A ReviewIOSR Journals
Abstract: As the IT industry is growing day by day, the need of computing and storage is increasing
rapidly. The amount of data exchanged over the network is constantly increasing. Thus the process of this
increasing mass of data requires more computer equipment to meet the various needs of the organizations.
To better capitalize their investment, the over-equipped organizations open their infrastructures to others by
exploiting the Internet and other important technologies such as virtualization by creating a new computing
model: the cloud computing. Cloud computing is one of the significant milestones in recent times in the
history of computers. The basic concept of cloud computing is to provide a platform for sharing of resources
which includes software and infrastructure with the help of virtualization. This paper presents a brief review
of cloud computing. The main emphasize of this paper is on the load balancing technique in cloud
computing.
Keywords: Cloud Computing, Load Balancing, Dynamic Load Balancing, Virtualization, Data Center.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Challenges and Benefits-for Adopting the Paradigm of Cloud ComputingMervat Bamiah
Cloud computing is a rapidly emerging technology that has removed the saddle of buying licensed software and heavy hardware. By exploiting this technology, clients are able to access resources remotely by using a simple web browser. They are not required to maintain hardware devices or software applications, so it saves managing cost and time for organizations. Many industries, such as banking, healthcare, and education, are moving towards the cloud due to the efficiency of services provided by the pay-per-use pattern. The utilization and payment process of cloud computing is similar to other common utilities such as electricity. As the users of electricity are only required to pay for the amount of electricity consumed throughout the month. Similarly, cloud providers charge the users based on the exploitation of a cloud system or resources such as processing power used, transactions carried out, bandwidth consumed, data transferred, or storage space occupied. Cloud computing is a completely internet dependent technology where client data is stored in the data center of a cloud provider. There are various challenges for adopting cloud computing such as privacy, interoperability and reliability. Beside these challenges, there are also several benefits for adopting this technology such as cost savings, easy scalability, and increased productivity. This research paper introduces a big picture of cloud computing and analyzes the key challenges as well as benefits of adopting the paradigm of cloud computing.
Guddu Kumar. “A Review on Data Protection of Cloud Computing Security, Benefits, Risks and Suggestions” United International Journal for Research & Technology (UIJRT) 1.2 (2019): 26-34.
Cloud computing security through symmetric cipher modelijcsit
Cloud computing can be defined as an application and services which runs on distributed network using
virtualized and it is accessed through internet protocols and networking. Cloud computing resources and
virtual and limitless and information’s of the physical systems on which software running are abstracted
from the user. Cloud Computing is a style of computing in which dynamically scalable and often virtualized
resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or
control over the technology infrastructure in the "cloud" that supports them. To satisfy the needs of the
users the concept is to incorporate technologies which have the common theme of reliance on the internet
Software and data are stored on the servers whereas cloud computing services are provided through
applications online which can be accessed from web browsers. Lack of security and access control is the
major drawback in the cloud computing as the users deal with sensitive data to public clouds .Multiple
virtual machine in cloud can access insecure information flows as service provider; therefore to implement
the cloud it is necessary to build security. Therefore the main aim of this paper is to provide cloud
computing security through symmetric cipher model. This article proposes symmetric cipher model in
order to implement cloud computing security so that data can accessed and stored securely.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
When stars align: studies in data quality, knowledge graphs, and machine lear...
H046053944
1. Deepika Singh et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 6( Version 5), June 2014, pp.39-44
www.ijera.com 39 | P a g e
User Security in Cloud Using Password Authentication
Deepika Singh1
, Puran Gour2
, Rajeev Thakur3
M.Tech Scholar NRI Institute of Information Science & Technology Bhopal (M.P)-462021, India
Abstract
Cloud computing technology is an open standard, service-based, Internet-centric, safe, convenient data storage
and network computing services [8]. Cloud computing is an internet based model for enabling convenient, on
demand network access to a shared pool of configurable computing resources [9]. The software and data that
you access for your work doesn‟t exist on your computer instead it‟s on the server. This concept of using
services not stored on your system is called Cloud Computing.
In this paper, we are implementing a technique to enhance the security of cloud. We create an algorithm based
on the selection of username and generate a password to strengthen the security in cloud.
Keywords- Cloud computing, cloud architecture, front end, hybrid cloud, IaaS, PaaS, private cloud, SaaS.
I. Introduction to Cloud Computing
Cloud computing is the next stage in the
Internet's evolution, providing the means through
which everything- from computing power to
computing infrastructure, applications, business
processes to personal collaboration can be delivered
to you as a service wherever and whenever you
need[19].
The Internet is commonly visualized as clouds;
hence the term “cloud computing” stands for
computation done through the Internet. With Cloud
Computing users can access database resources via
the Internet from anywhere, for as long as they need,
without worrying about any maintenance or
management of actual resources.
Cloud computing is a term used to describe both
a platform and type of application. A cloud
computing platform dynamically provisions,
configures, reconfigures, and de-provisions servers as
needed. Servers in the cloud can be physical
machines or virtual machines. Advanced clouds
typically include other computing resources such as
storage area networks (SANs), network equipment,
firewall and other security devices [12].
Key Cloud Computing providers: IBM, HP,
Google, Microsoft, Amazon Web Services,
Salesforce.com, NetSuite, VMware etc.
Examples of Cloud Computing services include
Google Docs, Office 365, Drop Box, SkyDrive etc.
II. Cloud computing architecture:-
The Cloud Computing architecture comprises of
many cloud components, each of them is loosely
coupled. We can broadly divide the cloud
architecture into two parts:
1. Front End 2.Back End
The following diagram shows the graphical view of
cloud computing architecture:
Fig1. Cloud computing architecture
Each of the ends are connected through a network,
usually via Internet.
1. Front End: - Front End refers to the client part
of cloud computing system. It consists of
interfaces and applications that are required to
access the cloud computing platforms, e.g., Web
Browser.
2. Back End: - Back End refers to the cloud itself.
It consists of all the resources required to provide
cloud computing services. It comprises of
huge data storage, virtual machines, security
mechanism, services, deployment models,
servers, etc.
RESEARCH ARTICLE OPEN ACCESS
2. Deepika Singh et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 6( Version 5), June 2014, pp.39-44
www.ijera.com 40 | P a g e
Figure 1 shows the cloud computing architecture.
The services provided by cloud computing can be
divided into three categories.
Service Models: - The service models are explained
below:
Infrastructure as a service (IaaS): The simplest of
cloud computing offerings. It involves the delivery of
huge computing resources such as the capacity of
storage, processing, and network. It is the ability to
remotely access computing resources. The major
advantages of IaaS are pay per use, security, and
reliability. IaaS is also known as hardware-as-a-
service. An example of IaaS is the Amazon Elastic
Compute Cloud (EC2) [1].
Platform as a service (PaaS): supports a set of
application programs interface to cloud applications.
It has emerged due to the suboptimal nature of IaaS
for cloud computing and the development of Web
applications. Many big companies are seeking to
dominate the platform of cloud computing, as
Microsoft dominated the personal computer (PC).
Examples of PaaS are Google App Engine and
Microsoft Azure [1].
Software as a service (SaaS): provides a service that
is directly consumable by the end user. It is a
software deployed over the Internet. This is a pay-as-
you-go service. It seeks to replace the applications
running on a PC. A typical example of SaaS is
Salesforce.com [1].
Fig2. Cloud services
There are a specific set of sub-services that
describe specializations of the above cloud
computing service models. These sub-services
are described in the table below [21]:
TABLE1 Cloud sub-services
Sub-Service Type Description
IaaS: DataBase as a
Service (DBaaS)
DBaaS allows the access and
use of a database management
system as a service.
IaaS: Compute
Capacity as a
Service (CCaaS)
CCaaS is the provision of
“raw” computing resource,
typically used in the execution
of mathematically complex
models from either a single
“supercomputer” resource or a
large number of distributed
computing resources where the
task performs well.
PaaS: Storage as a
Service (STaaS)
STaaS involves the delivery of
data storage as a service,
including database-like
services, often billed on a
utility computing basis, e.g.,
per gigabyte per month.
PaaS: Desktop as a
Service (DTaaS)
DTaaS is the decoupling of a
user‟s physical machine from
the desktop and software he or
she uses to work.
SaaS:
Communications as
a Service (CaaS)
CaaS is the delivery of an
enterprise communications
solution, such as Voice Over
IP, instant messaging, and
video conferencing applications
as a service.
SaaS: Monitoring as
a Service (MaaS)
MaaS refers to the delivery of
second-tier infrastructure
components, such as log
management and asset tracking,
as a service.
SaaS: SECurity as a
Service (SECaaS)
SECaaS is the security of
business networks and mobile
networks through the Internet
for events, database,
application, transaction, and
system incidents.
Deployment Models:-
1. Private cloud: - The cloud infrastructure is
provisioned for exclusive use by a single organization
comprising multiple consumers (e.g., business units).
It may be owned, managed, and operated by the
3. Deepika Singh et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 6( Version 5), June 2014, pp.39-44
www.ijera.com 41 | P a g e
organization, a third party, or some combination of
them, and it may exist on or off premises [7].
2. Community cloud: - The cloud infrastructure is
provisioned for exclusive use by a specific
community of consumers from organizations that
have shared concerns (e.g., mission, security
requirements, policy, and compliance
considerations). It may be owned, managed, and
operated by one or more of the organizations in the
community, a third party, or some combination of
them, and it may exist on or off premises [7].
3. Public cloud: - The cloud infrastructure is
provisioned for open use by the general public. It
may be owned, managed, and operated by a business,
academic, or government organization, or some
combination of them. It exists on the premises of the
cloud provider [7].
4. Hybrid cloud: - The cloud infrastructure is a
composition of two or more distinct cloud
infrastructures (private, community, or public) that
remain unique entities, but are bound together by
standardized or proprietary technology that enables
data and application portability (e.g., cloud bursting
for load balancing between clouds) [7].
III. Authentication in cloud
Cloud computing is not secure by nature.
Security in the Cloud is often intangible and less
visible, which inevitably creates a false sense of
security and anxiety about what is actually secured
and controlled. The off-premises computing
paradigm that comes with cloud computing has
incurred great concerns on the security of data,
especially the integrity and confidentiality of data, as
cloud service providers may have complete control
on the computing infrastructure that underpins the
services [16].
Authentication is quite challenging and
difficult in the case of Cloud Computing. In Cloud
computing, a third party is responsible for providing
computational power, storage space and application
support etc. Every data which is used by a user is
stored in Cloud database. Cloud database is
maintained by third party Cloud provider, so user
hesitates to keep his data at Cloud database. In order
to utilize the resources of Cloud, user has to prove
with some identity stating that it is valid person
seeking permission to use their resources. If a user
needs to use or control a remote server or process
financial transactions, the user needs to pass the
authentication phase first [20].
Authentication is the process of establishing
confidence in user identities. Authentication
assurance levels should be appropriate for the
sensitivity of the application and information assets
accessed and the risk involved. A growing number of
cloud providers support the SAML (Security
Assertion Markup Language) standard and use it to
administer users and authenticate them before
providing access to applications and data. SAML
provides a means to exchange information between
cooperating domains [17], [18].
IV. Problem Formulated
In this paper, we have made an attempt to
enhance the security of cloud computing by using
Password Authentication technique. Even though
Cloud Computing offers various benefits and newer
services, everyone has different opinions about the
security aspects of it. Because of these security
concerns, it is still not gaining its full momentum.
Many organizations are stepping back as they don‟t
want to take the security risk. Thus, it is essential to
have more standard security measures for cloud
computing in order to gain complete acceptance from
all levels of organizations.
V. Proposed Methodology
VI.
A. How to start
When one starts the cloud service they will be
provided with options to select. For registration
user have to pass through authentication process.
In that on the basis of username, process will be
started at the server-side. Set of images which
will be provided to user are based on result of
calculation.
Fig3.Tree diagram of alphabets & its position
From the above tree diagram we can find the values
of alphabets depending upon the position of alphabets
in the tree. For e.g.:-
4. Deepika Singh et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 6( Version 5), June 2014, pp.39-44
www.ijera.com 42 | P a g e
A = 0, Left sub-tree of A is B which is 00 & right
sub-tree is C which is 01.
Table2 Position of alphabets
A = 0 N = 0010
B = 00 O = 0111
C = 01 P = 00000
D = 000 Q = 00011
E = 001 R = 00100
F = 010 S = 00111
G = 011 T = 01000
H = 0000 U = 01011
I = 0001 V = 01101
J = 0010 W = 01111
K = 0011 X = 000111
L = 0100 Y = 001111
M = 0101 Z = 010111
B. Calculation of data to be sent
Enter username not more than 6 characters.
Example 1
Fig4. Even & odd positions in username ABCD
For username ABCD (4 characters username)
A B C D
0 00 01 000
Rearranging the odd & even positions separately:
A C B D
0 01 00 000
Insert redundancy bits 11111(5 times 1)
So the data username will become
01111101111110011111000
Example 2
Fig5. Even & odd positions in username EDBCG
For username EDBCG (5 characters username)
E D B C G
001 000 00 01 011
Rearranging the odd & even positions separately:
E B G D C
001 00 011 000 01
Insert redundancy bits 11111(5 times 1)
So the data username will become
0011111100111110111111100011111101
Algorithm for sender (Encryption):-
Step 1. Design tree for alphabets A to Z.
Step 2. Start from A, assign left sub-tree as 0 and
right sub-tree as 1.
Step 3. Repeat the procedure up to Z.
Step 4. Enter the username.
Step 5. Re-arrange the alphabets according to even
and odd positions.
Step 6. Arrange odd position alphabet first and even
position at last.
Step 7. Assign values to the alphabet in the username
i.e. A=0, B=00, C=01 etc.
Step 8. Insert redundancy bits between the values of
the username.
Step 9. Send the data username with added
redundancy bits.
Fig6. Flow chart for sender
Algorithm for receiver (Decryption):-
Step 1. Received data find with redundancy bits.
Step 2. Start from A, assign left sub-tree as 0 and
right sub-tree as 1.
5. Deepika Singh et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 6( Version 5), June 2014, pp.39-44
www.ijera.com 43 | P a g e
Step 3. In our example, redundancy bit is „11111‟ (5
times 1), which is used to represent the end and start
oh the values.
Step 4. Fetch the actual data after detecting the
redundancy bit from the received data.
Step 5. Assign the alphabet to the numeric values in
the received data.
Step 6. Rearrange according to odd and even position
in alphabetic order.
Fig7. Flow chart for receiver
Advantage of this technique:-
1. It is a unique method using simple methodology
which is not easy to guess.
2. We don‟t need to remember long passwords.
3. Numeric values enhance the security of cloud
accessing.
4. Less calculation time improve the throughput of
the server.
VII. Conclusion
We conclude this technique of password
authentication provides more secure authentication
than the usual text password technique. The proposed
algorithm can also be enhanced with more than 6
alphanumeric characters provided by the user for
future work.
References
[1] Matthew N.O. Sadiku, Sarhan M. Musa, and
OMonowo D. MoMOh, Cloud computing:
Opportunities and challenges, IEEE
potentials, pp. 34-36, January/February 2014.
[2] Shraddha M. Gurav, Leena S. Gawade,
Prathamey K. Rane and Nilesh R. Khochare,
Graphical Password Authentication Cloud
securing scheme, IEEE Computer Society ,
pp.479-483, 2014.
[3] Bogdan Hoanca and Kenrich Mock, Secure
graphical password system for high traffic
public areas, ETRA June 2006.
[4] Brown, Bracken, Zoccali & Douglas, Sasse et
al., 2001; 2004.
[5] Chiasson, S., Biddle, R., and van Oorschot,
P.C. A Second Look at the Usability of Click-
Based Graphical Passwords. Symp. on Usable
Privacy and Security (SOUPS) 2007.
[6] D. Davis, F. Monrose, and M. Reiter, ―On
user choice in graphical password schemes,
USENIX Security Symposium, 2004.
[7] NIST Cloud Computing Standards Roadmap,
July 2013.
[8] IEEE – The Application of cloud computing in
education informatization, madern educational
tech...Center Bo Wang, HongYu Xing.
[9] NISTdefinition
http://www.au.af.mil/au/awc/awcgate/nist/clou
d-def-v15.doc
[10] Alireza Pirayesh Sabzevar, Angelos Stavrou,
Universal Multi-Factor Authentication Using
Graphical Passwords, IEEE International
Conference on Signal Image Technology and
Internet Based Systems (SITIS) ISBN: 978-0-
7695-3493-0 2008.
[11] FABIAN MONROSE AND MICHAEL K.
REITER, Graphical Passwords, August 5,
2005.
[12] Web-Resource
http://en.wikipedia.org/wiki/Cloud_computing
[13] R. Kandukuri, R. Paturi V, and A. Rakshit,
Cloud security issues, in Proc. IEEE Int. Conf.
Services Comput., Bangalore, India, 2009, pp.
517–520.
[14] http://www.infoworld.com/article/08/04/07/15
FE-cloud-computing-reality_1.html, What
Cloud Computing Really Means.
[15] Software as a service, Wikipedia,
http://en.wikipedia.org/wiki/Software_as_a_se
rvice.
[16] Pardeep Kumar, Vivek Kumar Sehgal, Durg
Singh Chauhan, P. K. Gupta and Manoj
Diwakar, Effective Ways of Secure, Private
and Trusted Cloud Computing, International
Journal of Computer Science Issues (IJCSI),
ISSN (Online): 1694-0814, Vol. 8, Issue 3, No.
2, pp. 412-421, May 2011.
[17] B.Prasanalakshmi, A.Kannammal, Secure
Credential Federation for Hybrid Cloud
Environment with SAML Enabled Multifactor
6. Deepika Singh et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 6( Version 5), June 2014, pp.39-44
www.ijera.com 44 | P a g e
Authentication using Biometrics, International
Journal of Computer Applications (0975 –
8887) Volume 53– No.18, pp. 13-19,
September 2012.
[18] Pradnya B. Rane, Pallavi Kulkarni, Suchita
Patil, Dr. B.B.Meshram, Authentication and
Authorization:Tool for Ecommerce Security,
IRACST – Engineering Science and
Technology: An International Journal (ESTIJ),
ISSN: 2250-3498, Vol.2, No.1, pp. 150-157,
2012.
[19] Tejas.P.Bhatt, Ashish Maheta, Security in
Cloud Computing using File Encryption,
International Journal of Engineering Research
and Technology (IJERT), Vol. 1, Issue 9,
November 2012.
[20] Amlan et al., A Strong User Authentication
Framework for Cloud Computing, Asia-
Pacific Services Computing Conference, IEEE
Computer Society, 2011, pp 110-115.
[21] INFORMATION SECURITY BRIEFING
01/2010 CLOUD COMPUTING
http://www.cpni.gov.uk/Documents/.../201000
7-ISB_cloud_computing.pdf