Usually, cloud infrastructure is used individually by businesses, whereas the hybrid cloud would be a blend of two or many kinds of clouds. Because as clouds become increasingly common, safety issues also expanding. Because of such cybersecurity threats, numerous experts suggested procedures as well as ways to assure internet confidentiality. Providers of cloud-based services were accountable for the complete safety of cloud information. Nevertheless, since the clouds are accessible (easily accessible over the World wide web), much research has been conducted on cloud storage cybersecurity. This paper describes methods for enhancing security and reliability in decentralized cloud-based solutions, as well as suggests a few security solution methods of implementation.
Security threat issues and countermeasures in cloud computingJahangeer Qadiree
Cloud computing field has reached to the highest level of technical heights. The security problems of cloud computing hinders
its development. It is totally internet based technology where the resources and information shared on a distributed network. So
it is important for both provider as well as consumer to provide the security and trust to share the data for developing clou d
computing applications. Because now organizations are now moving fast towards the cloud. So there is the possibility of threats
that will harm the data on the cloud. In our paper we mainly focuses on security threats of cloud computing system also we
mention some solutions and countermeasures on these security problems
Abstract--The paper identifies the issues and the solution to overcome these problems. Cloud computing is a subscription based service where we can obtain networked storage space and computer resources. This technology has the capacity to admittance a common collection of resources on request. It is the application provided in the form of service over the internet and system hardware in the data centers that gives these services. But having many advantages for IT organizations cloud has some issues that must be consider during its deployment. The main concern is security privacy and trust. There are various issues that need to be dealt with respect to security and privacy in a cloud computing scenario [4].
Keywords--Cloud, Issues, Security, Privacy, Resources, Technology.
Security of Data in Cloud Environment Using DPaaSIJMER
The rapid development of cloud computing is giving way to more cloud services, due to
which security of services of cloud especially data confidentiality protection, becomes more critical.
Cloud computing is an emerging computing style which provides dynamic services, scalable and payper-use.
Although cloud computing provides numerous advantages, a key challenge is how to ensure
and build confidence that the cloud can handle user data securely. This paper highlights some major
security issues that exist in current cloud computing environments. The status of the development of
cloud computing security, the data privacy analysis, security audit, information check and another
challenges that the cloud computing security faces have been explored. The recent researches on data
protection regarding security and privacy issues in cloud computing have partially addressed some
issues. The best option is to build data-protection solutions at the platform layer. The growing appeal
of data protection as a service is that it enables to access just the resources you need at minimal
upfront expense while providing the benefits of enterprise-class data protection capabilities. The
paper proposes a solution to make existing developed applications for simple cloud Systems
compatible with DPaaS. The various security challenges have been highlighted and the various
necessary metrics required for designing DPaaS have been investigated.
Security threat issues and countermeasures in cloud computingJahangeer Qadiree
Cloud computing field has reached to the highest level of technical heights. The security problems of cloud computing hinders
its development. It is totally internet based technology where the resources and information shared on a distributed network. So
it is important for both provider as well as consumer to provide the security and trust to share the data for developing clou d
computing applications. Because now organizations are now moving fast towards the cloud. So there is the possibility of threats
that will harm the data on the cloud. In our paper we mainly focuses on security threats of cloud computing system also we
mention some solutions and countermeasures on these security problems
Abstract--The paper identifies the issues and the solution to overcome these problems. Cloud computing is a subscription based service where we can obtain networked storage space and computer resources. This technology has the capacity to admittance a common collection of resources on request. It is the application provided in the form of service over the internet and system hardware in the data centers that gives these services. But having many advantages for IT organizations cloud has some issues that must be consider during its deployment. The main concern is security privacy and trust. There are various issues that need to be dealt with respect to security and privacy in a cloud computing scenario [4].
Keywords--Cloud, Issues, Security, Privacy, Resources, Technology.
Security of Data in Cloud Environment Using DPaaSIJMER
The rapid development of cloud computing is giving way to more cloud services, due to
which security of services of cloud especially data confidentiality protection, becomes more critical.
Cloud computing is an emerging computing style which provides dynamic services, scalable and payper-use.
Although cloud computing provides numerous advantages, a key challenge is how to ensure
and build confidence that the cloud can handle user data securely. This paper highlights some major
security issues that exist in current cloud computing environments. The status of the development of
cloud computing security, the data privacy analysis, security audit, information check and another
challenges that the cloud computing security faces have been explored. The recent researches on data
protection regarding security and privacy issues in cloud computing have partially addressed some
issues. The best option is to build data-protection solutions at the platform layer. The growing appeal
of data protection as a service is that it enables to access just the resources you need at minimal
upfront expense while providing the benefits of enterprise-class data protection capabilities. The
paper proposes a solution to make existing developed applications for simple cloud Systems
compatible with DPaaS. The various security challenges have been highlighted and the various
necessary metrics required for designing DPaaS have been investigated.
A traditional computing environment requires a costly
infrastructure to offer a better service to users. The introduction
of cloud computing has changed the working environment from
traditional to virtual. A larger number of IT companies are
utilizing the cloud. On the one hand, the cloud attracts more
number of consumers by offering services with minimized
capital cost and virtual infrastructure. On the other hand, there
are a risk and security challenges in cloud computing that
makes the user not to move completely towards it. The cloud
environment is more vulnerable to security breaches and data
theft. Moreover, insider attacks are more frequent in larger
enterprises. An unauthenticated user can cause more damage
to company reputation. The cloud service providers are trying
to provide a secure work environment for users. However,
there is a lack of global standards and policies to invoke
security measures in cloud computing. This study aims to
highlight and classify security challenges and trust issues in the
cloud environment.
The survey was conducted in various institutions and
governmental organizations in Saudi Arabia to study the
opinions of stakeholders on cloud computing security
challenges and risks.
Links:
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
Cloud computing provides the facility to access shared resources and common support which contributes services on
demand over the network to perform operations that meet changing business needs. A cloud storage system, consisting of a collection
of storage servers, affords long-term storage services over the internet. Storing the data in a third party cloud system cause serious
concern over data confidentiality, without considering the local infrastructure limitations, the cloud services allow the user to enjoy the
cloud applications. As the different users may be working in the collaborative relationship, the data sharing becomes significant to
achieve productive benefit during the data accessing. The existing security system only focuses on the authentication; it shows that
user’s private data cannot be accessed by the fake users. To address the above cloud storage privacy issue shared authority based
privacy-preserving authentication protocol is used. In the SAPA, the shared access authority is achieved by anonymous access request
and privacy consideration, attribute based access control allows the user to access their own data fields. To provide the data sharing
among the multiple users proxy re-encryption scheme is applied by the cloud server. The privacy-preserving data access authority
sharing is attractive for multi-user collaborative cloud applications.
A Novel Computing Paradigm for Data Protection in Cloud ComputingIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
Cloud computing provides the facility to access shared resources and common support which contributes services on demand over the network to perform operations that meet changing business needs. A cloud storage system, consisting of a collection of storage servers, affords long-term storage services over the internet. Storing the data in a third party cloud system cause serious concern over data confidentiality, without considering the local infrastructure limitations, the cloud services allow the user to enjoy the cloud applications. As the different users may be working in the collaborative relationship, the data sharing becomes significant to achieve productive benefit during the data accessing. The existing security system only focuses on the authentication; it shows that user’s private data cannot be accessed by the fake users. To address the above cloud storage privacy issue shared authority based privacy-preserving authentication protocol is used. In the SAPA, the shared access authority is achieved by anonymous access request and privacy consideration, attribute based access control allows the user to access their own data fields. To provide the data sharing among the multiple users proxy re-encryption scheme is applied by the cloud server. The privacy-preserving data access authority sharing is attractive for multi-user collaborative cloud applications.
Cloud Computing is a versatile technology that can support a broad-spectrum of applications. The low cost of cloud computing and its dynamic scaling renders it an innovation driver for small companies, particularly in the developing world. Cloud deployed enterprise resource planning (ERP), supply chain management applications (SCM), customer relationship management (CRM) applications, medical applications and mobile applications have potential to reach millions of users. In this paper, we explore the different concepts involved in cloud computing. Leveraging our experiences on various clouds, we examine clouds from technical, and service aspects. We highlight some of the opportunities in cloud computing, underlining the importance of clouds and showing why that technology must succeed. Finally, we discuss some of the issues that this area should deal with. The paper aims to provide a means of understanding the model and exploring options available for complementing your technology and infrastructure needs.
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
The Most great challenging in Cloud computing is Security. Here Security plays key role
in this paper proposed concept mainly deals with security at the end user access. While coming to the
end user access that are connected through the public networks. Here the end user wants to access his
application or services protected by the unauthorized persons. In this area if we want to apply
encryption or decryption methods such as RSA, 3DES, MD5, Blow fish. Etc.,
Whereas we can utilize these services at the end user access in cloud computing. Here there is
problem of encryption and decryption of the messages, services and applications. They are is lot of
time to take encrypt as well as decrypt and more number of processing capabilities are needed to use
the mechanism. For that problem we are introducing to use of cloud computing in SaaS model. i.e.,
scalable is applicable in this area so whenever it requires we can utilize the SaaS model.
In Cloud computing use of computing resources (hardware and software) that are delivered as a
service over Internet network. In advance earlier there is problem of using key size in various
algorithm like 64 bit it take some long period to encrypt the data.
An efficient and secure data storage in cloud computing using modified RSA pu...IJECEIAES
Cloud Computing is the ability to improve the utility or train new human resources without investing in new infrastructure, or add capabilities to existence without the latest software licensing. It expanded the capabilities of Information Technology (IT). From the past few years, cloud computing has developed from a good business concept in the best rising sectors of the IT industry. But more information on individuals and companies was put in the cloud, and concerns began to think about how secure the cloud environment was. Despite cloud surrounding structures, enterprise users still do not want to expand their business in the cloud. Security reduces the growth of cloud computing and continues to spread the market with complexity with data privacy and data protection. The security of cloud computing has constantly been an significant aspect of improved quality of service from cloud service providers. Data storage in the cloud has a problem related to data security. However, cloud computing construct many new security challenges which have not been well examine. In order to ensure that the user's data in the cloud is secure, we have proposed an effective mechanism with a distinctive feature of data integrity and privacy. This paper focusing on problems relating to the cloud data storage techniques and security in virtual environment. We recommend a method for providing data storage and security in cloud using public key Cryptosystem, which uses the concept of the modified RSA algorithm to provide better security for the data stored in the cloud.
Security for Effective Data Storage in Multi CloudsEditor IJCATR
Cloud Computing is a technology that uses the internet and central remote servers to maintain data and
applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal
files at any computer with internet access. This technology allows for much more efficient computing by centralizing data
storage, processing and bandwidth. The use of cloud computing has increased rapidly in many organizations. Cloud computing
provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor
in the cloud computing environment, as users often store sensitive information with cloud storage providers but these providers
may be untrusted. Dealing with “single cloud” providers is predicted to become less popular with customers due to risks of
service availability failure and the possibility of malicious insiders in the single cloud. A movement towards “multi-clouds”, or in
other words, “interclouds” or “cloud-of clouds” has emerged recently. This paper surveys recent research related to single and
multi-cloud security and addresses possible solutions. It is found that the research into the use of multicloud providers to maintain
security has received less attention from the research community than has the use of single clouds. This work aims to promote the
use of multi-clouds due to its ability to reduce security risks that affect the cloud computing user.
Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...IIJSRJournal
With the rapid advancement of computer technology during the last couple of decades. Computer systems are commonly used in manufacturing, corporate, as well as other aspects of human living. As a result, constructing dependable infrastructures is a major challenge for IT managers. On the contrary side, this same rapid advancement of technology has created numerous difficulties in building reliable networks which are challenging tasks. There seem to be numerous varieties of attacks that affect the accessibility, authenticity, as well as secrecy of communications systems. In this paper, an in-depth and all-inclusive description of artificial intelligence methods used for the detection of network intrusions is discussed in detail.
Agriculture in Indian Economy and Contribution of Science and Technology IIJSRJournal
One of the oldest occupations in history, agriculture has benefited much from innovation throughout the years. Since then, science has played a significant role in agricultural innovation and quality assurance. We have listed a few of the factors that were mentioned in the introduction section if you'd want to understand more about the significance of science and technology in agriculture. Encouraging the use of science and technology is the cornerstone for improving agriculture's productivity, quality, efficiency, and competitiveness, which also contributes to the modernization of agriculture and rural areas, ensures food security, social security, and increases the income of agricultural producers and traders.
More Related Content
Similar to Methodologies for Enhancing Data Integrity and Security in Distributed Cloud Computing with Techniques to Implement Security Solutions
A traditional computing environment requires a costly
infrastructure to offer a better service to users. The introduction
of cloud computing has changed the working environment from
traditional to virtual. A larger number of IT companies are
utilizing the cloud. On the one hand, the cloud attracts more
number of consumers by offering services with minimized
capital cost and virtual infrastructure. On the other hand, there
are a risk and security challenges in cloud computing that
makes the user not to move completely towards it. The cloud
environment is more vulnerable to security breaches and data
theft. Moreover, insider attacks are more frequent in larger
enterprises. An unauthenticated user can cause more damage
to company reputation. The cloud service providers are trying
to provide a secure work environment for users. However,
there is a lack of global standards and policies to invoke
security measures in cloud computing. This study aims to
highlight and classify security challenges and trust issues in the
cloud environment.
The survey was conducted in various institutions and
governmental organizations in Saudi Arabia to study the
opinions of stakeholders on cloud computing security
challenges and risks.
Links:
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
Cloud computing provides the facility to access shared resources and common support which contributes services on
demand over the network to perform operations that meet changing business needs. A cloud storage system, consisting of a collection
of storage servers, affords long-term storage services over the internet. Storing the data in a third party cloud system cause serious
concern over data confidentiality, without considering the local infrastructure limitations, the cloud services allow the user to enjoy the
cloud applications. As the different users may be working in the collaborative relationship, the data sharing becomes significant to
achieve productive benefit during the data accessing. The existing security system only focuses on the authentication; it shows that
user’s private data cannot be accessed by the fake users. To address the above cloud storage privacy issue shared authority based
privacy-preserving authentication protocol is used. In the SAPA, the shared access authority is achieved by anonymous access request
and privacy consideration, attribute based access control allows the user to access their own data fields. To provide the data sharing
among the multiple users proxy re-encryption scheme is applied by the cloud server. The privacy-preserving data access authority
sharing is attractive for multi-user collaborative cloud applications.
A Novel Computing Paradigm for Data Protection in Cloud ComputingIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
Cloud computing provides the facility to access shared resources and common support which contributes services on demand over the network to perform operations that meet changing business needs. A cloud storage system, consisting of a collection of storage servers, affords long-term storage services over the internet. Storing the data in a third party cloud system cause serious concern over data confidentiality, without considering the local infrastructure limitations, the cloud services allow the user to enjoy the cloud applications. As the different users may be working in the collaborative relationship, the data sharing becomes significant to achieve productive benefit during the data accessing. The existing security system only focuses on the authentication; it shows that user’s private data cannot be accessed by the fake users. To address the above cloud storage privacy issue shared authority based privacy-preserving authentication protocol is used. In the SAPA, the shared access authority is achieved by anonymous access request and privacy consideration, attribute based access control allows the user to access their own data fields. To provide the data sharing among the multiple users proxy re-encryption scheme is applied by the cloud server. The privacy-preserving data access authority sharing is attractive for multi-user collaborative cloud applications.
Cloud Computing is a versatile technology that can support a broad-spectrum of applications. The low cost of cloud computing and its dynamic scaling renders it an innovation driver for small companies, particularly in the developing world. Cloud deployed enterprise resource planning (ERP), supply chain management applications (SCM), customer relationship management (CRM) applications, medical applications and mobile applications have potential to reach millions of users. In this paper, we explore the different concepts involved in cloud computing. Leveraging our experiences on various clouds, we examine clouds from technical, and service aspects. We highlight some of the opportunities in cloud computing, underlining the importance of clouds and showing why that technology must succeed. Finally, we discuss some of the issues that this area should deal with. The paper aims to provide a means of understanding the model and exploring options available for complementing your technology and infrastructure needs.
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
The Most great challenging in Cloud computing is Security. Here Security plays key role
in this paper proposed concept mainly deals with security at the end user access. While coming to the
end user access that are connected through the public networks. Here the end user wants to access his
application or services protected by the unauthorized persons. In this area if we want to apply
encryption or decryption methods such as RSA, 3DES, MD5, Blow fish. Etc.,
Whereas we can utilize these services at the end user access in cloud computing. Here there is
problem of encryption and decryption of the messages, services and applications. They are is lot of
time to take encrypt as well as decrypt and more number of processing capabilities are needed to use
the mechanism. For that problem we are introducing to use of cloud computing in SaaS model. i.e.,
scalable is applicable in this area so whenever it requires we can utilize the SaaS model.
In Cloud computing use of computing resources (hardware and software) that are delivered as a
service over Internet network. In advance earlier there is problem of using key size in various
algorithm like 64 bit it take some long period to encrypt the data.
An efficient and secure data storage in cloud computing using modified RSA pu...IJECEIAES
Cloud Computing is the ability to improve the utility or train new human resources without investing in new infrastructure, or add capabilities to existence without the latest software licensing. It expanded the capabilities of Information Technology (IT). From the past few years, cloud computing has developed from a good business concept in the best rising sectors of the IT industry. But more information on individuals and companies was put in the cloud, and concerns began to think about how secure the cloud environment was. Despite cloud surrounding structures, enterprise users still do not want to expand their business in the cloud. Security reduces the growth of cloud computing and continues to spread the market with complexity with data privacy and data protection. The security of cloud computing has constantly been an significant aspect of improved quality of service from cloud service providers. Data storage in the cloud has a problem related to data security. However, cloud computing construct many new security challenges which have not been well examine. In order to ensure that the user's data in the cloud is secure, we have proposed an effective mechanism with a distinctive feature of data integrity and privacy. This paper focusing on problems relating to the cloud data storage techniques and security in virtual environment. We recommend a method for providing data storage and security in cloud using public key Cryptosystem, which uses the concept of the modified RSA algorithm to provide better security for the data stored in the cloud.
Security for Effective Data Storage in Multi CloudsEditor IJCATR
Cloud Computing is a technology that uses the internet and central remote servers to maintain data and
applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal
files at any computer with internet access. This technology allows for much more efficient computing by centralizing data
storage, processing and bandwidth. The use of cloud computing has increased rapidly in many organizations. Cloud computing
provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor
in the cloud computing environment, as users often store sensitive information with cloud storage providers but these providers
may be untrusted. Dealing with “single cloud” providers is predicted to become less popular with customers due to risks of
service availability failure and the possibility of malicious insiders in the single cloud. A movement towards “multi-clouds”, or in
other words, “interclouds” or “cloud-of clouds” has emerged recently. This paper surveys recent research related to single and
multi-cloud security and addresses possible solutions. It is found that the research into the use of multicloud providers to maintain
security has received less attention from the research community than has the use of single clouds. This work aims to promote the
use of multi-clouds due to its ability to reduce security risks that affect the cloud computing user.
Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...IIJSRJournal
With the rapid advancement of computer technology during the last couple of decades. Computer systems are commonly used in manufacturing, corporate, as well as other aspects of human living. As a result, constructing dependable infrastructures is a major challenge for IT managers. On the contrary side, this same rapid advancement of technology has created numerous difficulties in building reliable networks which are challenging tasks. There seem to be numerous varieties of attacks that affect the accessibility, authenticity, as well as secrecy of communications systems. In this paper, an in-depth and all-inclusive description of artificial intelligence methods used for the detection of network intrusions is discussed in detail.
Agriculture in Indian Economy and Contribution of Science and Technology IIJSRJournal
One of the oldest occupations in history, agriculture has benefited much from innovation throughout the years. Since then, science has played a significant role in agricultural innovation and quality assurance. We have listed a few of the factors that were mentioned in the introduction section if you'd want to understand more about the significance of science and technology in agriculture. Encouraging the use of science and technology is the cornerstone for improving agriculture's productivity, quality, efficiency, and competitiveness, which also contributes to the modernization of agriculture and rural areas, ensures food security, social security, and increases the income of agricultural producers and traders.
The Effect of Kronecker Tensor Product Values on ECG Rates: A Study on Savitz...IIJSRJournal
This article presents a study on ECG signal filtering algorithms to denoise signals corrupted by various types of noise sources. The study also examines the effect of Kronecker tensor product values on ECG rates. The study is conducted in a Matlab environment, and the results demonstrate that a constant number for the respective codes can effectively denoise ECG signals without any trouble. These findings have significant implications for diagnosing abnormal heart rhythms and investigating chest pains. The present study is novel in that it explores the relationship between ECG rate and Kronecker delta values across different age groups, which has not been extensively studied in previous literature. The study's unique contribution is the determination of age-specific values of the constant K required to represent this relationship accurately in different populations, which could inform the development of more effective algorithms for denoising ECG signals in clinical settings. Additionally, this study's finding of an inverse relationship between ECG rate and Kronecker delta values could have broader implications for understanding the physiological factors that contribute to variability in ECG measurements. The study provides valuable insights into ECG signal processing and suggests that the implemented techniques can improve the accuracy of ECG signal analysis in real-time clinical settings. Overall, the manuscript is a valuable contribution to the field of biomedical signal processing and provides important information for researchers and healthcare professionals.
Basic Criteria for Building the Third Renaissance in Uzbekistan IIJSRJournal
On the occasion of the 29th anniversary of the independence of the Republic of Uzbekistan, President Shavkat Mirziyoyev emphasized that the goal of our development should be the Third Renaissance. This strategic idea, in its grandeur, shows the need to aim for a common goal in all aspects of national development. In practice, the head of state expressed the new and clarified content of the national idea of Uzbekistan at the current stage of development. This article analyzes the important role of literature, theater and art in establishing the Third Renaissance in Uzbekistan.
Assessment of Neglected and Under-Utilized Crop Species of African Horned Mel...IIJSRJournal
There is an increasing interest in neglected and under-utilized crop species (NUS) throughout the world, reflecting a growing trend within agriculture to identify and develop new crops for export and domestic markets. Interest in NUS stems from a variety of factors, including their contribution to agricultural diversification and better use of land, their economic potential and the opportunities they provide for diet diversification. The main objective was to assess the economic and nutritional value of neglected and utilized crop species of African horned melon in Zambia.
The study used the qualitative research design and descriptive, using desk review to collect secondary data from various literature on neglected and under-utilized crops species of African horned melon.
In conclusion, the findings reveal that the African horned melon has nutritional value consisting numerous vitamins and antioxidants which are beneficial to health living of humans and will contribute and broaden food diversity and nutritional among rural and urban communities of Zambia. The crop will promote healthy living among Zambian citizen to overcome malnutrition and obesity. Further, African horned melon is a climate change crop that will enhancing rural resiliency and climate smart agriculture activities in many areas. Communities must be trained and have knowledge experience of farmer-to-farmer capacity building in rural areas of Zambia.
Prevalence of Trichomonas Vaginalis Infection Among Married Pregnant Women in...IIJSRJournal
A cross-sectional survey of Trichomonas vaginalis infection has been conducted among married pregnant women attending antenatal clinics, for the first time in pregnancy, the direct microscopy technique was adopted. Of the 120 pregnant women studied, 4(3.3%) were infected with T. vaginalis. Individuals age 20-25 years were most infected (3.7%). Women in their third trimester of pregnancy were significantly more infected (1.1%), than those in their second trimester (1.6%) and first trimester (2.3%). Despite reporting a low prevalence of T. vaginalis among pregnant women in the study, this does not imply completely ruling out the presence of T. vaginalis among pregnant women due to the diagnostic technique and also that even the low occurrence among pregnant women in the hospitals cannot totally explain general occurrence. T. vaginalis infection can be dangerous and poses serious threat to the health. Hence, the need for prevention of T. vaginalis and that efforts for prevention of T. vaginalis infection should be targeted at all women of child bearing age. Since T. vaginalis is primarily sexually transmitted, educational efforts must be aimed at high risk groups including women without any formal education and must be explicit regarding the behaviours that leads to the spread of T. vaginalis, and other sexually transmitted infections. There is also the need for proper counseling and education on sexual behaviour and genital hygiene which would greatly help in the prevention of the infection.
Factors Influencing Professional Project Management Ethical Practices in Buil...IIJSRJournal
Ethical practices are essential to providing quality work which cut across every sector. In building construction, adherence to project management ethical standards is essential to providing quality services that can stand the test of time. However, many building projects have been constructed with standards that are far below the professional ethics. This is evident in the cases of building failure reported throughout the country. The study examines the factors that influences project management ethical practices in Nigeria and specifically in Lagos. A total of 384 samples were selected from project stakeholders and construction professionals. A well-structured 25 items questionnaire was designed to elicit for response on ethical practices and factors that influences ethical practices. The results indicated that ethical practices in project management are influenced by various factors, including the project environment and stakeholder's impact as organizational factors. The major project-related factors that affect ethical practices are project scope and complexity, project financing, project risk, and project stakeholders, while project managers' technical skills, qualifications, and personal values have significant impacts on adherence to ethical practices. The influencing factors could be related to the organization, the project, or the professional, but in most cases, they are a combination of these factors. Therefore, it is recommended that thorough assessments are conducted before, during, and after construction, and different professionals should be assigned to ensure transparency and compliance with standards.
Assessment of Water Occupancy Rates of the Çamlıgöze Dam Lake between 2010-20...IIJSRJournal
With the increasing world population, the importance of dam lakes is increasing within the framework of more effective and efficient use of water resources. This study focuses on the water occupancy rates of Çamlıgöze Dam Lake, located in Turkey, between the years 2010-2021. The annual average water occupancy rate of Çamlıgöze Dam Lake between 2010-2021 was calculated as 69.55 percent. This shows that approximately seventy percent of Çamlıgöze Dam Lake was full between 2010-2021. According to these values, it was determined that the water occupancy rates of Çamlıgöze Dam Lake did not face a serious decrease between 2010-2021. As a result, there is no short term problem in terms of water occupancy rates in Çamlıgöze Dam Lake, but this does not mean that it will not be a problem in the long term. For this reason, it should not be abandoned to use the water of Çamlıgöze Dam Lake effectively, economically and consciously.
Sustainability of Pod Yields of Groundnut through Crop Seasonal Rainfall, Len...IIJSRJournal
A study was conducted with the objective of assessing the effect of crop seasonal rainfall and length of growing period on the sustainability of pod yields of groundnut attained in 31 mandals under arid Alfisols of Anantapur in Andhra Pradesh. We have considered the variability of mandals with regard to (i) crop seasonal rainfall (mm) and (ii) pod yield of groundnut (kg/ha) during 2001 to 2020; (iii) extent of crop area (ha) during 2009 to 2020; and (iv) length of growing period (days). Based on the mean and standard deviation (SD) of each parameter, the mandals were classified into 5 groups viz., (i) G1: Less than (Mean–2SD); (ii) G2: (Mean–2SD) to (Mean–SD); (iii) G3: (Mean–SD) to (Mean+SD); (iv) G4: (Mean+SD) to (Mean+2SD); and (v) G5: More than (Mean+2SD). Out of 31 mandals, 22 mandals for area and crop seasonal rainfall, 20 mandals for LGP and 18 mandals for yield have fallen in G3. Estimates of correlation were derived between groundnut area, crop seasonal rainfall and yield for each mandal over years and tested for significance to assess the superiority of mandals. Significant correlation of yield and crop seasonal rainfall was observed which ranged from 0.433 at Kalyandurg to 0.765 at Putlur. Similarly, significant correlation between yield and area of groundnut was observed in Kalyandurg (-0.764), Brahmasamudram (-0.674) and Rapthadu (-0.584) mandals. The predictability of yield and prediction error were derived based on a regression model of yield calibrated through the crop seasonal rainfall, LGP and crop area in different mandals. The model gave significant predictability (R2) value of 0.46 with prediction error of 90.9 kg/ha and indicated negative effect of area, positive effect of crop seasonal rainfall and LGP on yield. The sustainability yield index ranged from 26.6% (Kambadur) to 87.5% (Peddavadagur) with mean of 53.9% (CV of 30.1%) over years. Ranks were assigned to the mean and variation of area, crop seasonal rainfall, yield, LGP and SYI of each mandal and rank sums were derived. Guntakal, Gooty and Vidapanakal were superior with rank sums of 30, 38 and 70 respectively. Guntakal was superior with an area of 16570 ha (CV of 17.3%), crop seasonal rainfall of 436.1 mm (CV of 33.4%), LGP of 140 days, yield of 644 kg/ha (CV of 70.9%) and SYI of 76.5%, while Gooty was superior with area of 14146 ha (CV of 14.6%), crop seasonal rainfall of 429.6 mm (CV of 42.4%), LGP of 140 days, yield of 663 kg/ha (CV of 69.1%) and SYI of 79.1%. Similarly, Vidapanakal was superior with area of 5077 ha (CV of 31.1%), crop seasonal rainfall of 403.2 mm (CV of 47.4%), LGP of 140 days, yield of 654 kg/ha (CV of 49.5%) and SYI of 77.9%. Due to maximum LGP and crop seasonal rainfall, we recommend that the farmers of these mandals could enhance the area of groundnut and attain maximum sustainable yields under arid Alfisols.
On the Modulation of Biocompatibility of Hydrogels with Collagen and Guar Gum...IIJSRJournal
In this work, we report the synthesis of molybdenum metal-organic frameworks (Mo-MOFs) using 1,3,5-benzenetricarboxylic acid and the amino acids L-phenylalanine, L- tryptophan, and L-histidine as ligands. They were incorporated in hydrogel matrixes comprised of collagen and guar gum to obtain composite hydrogels. The effect of chemical structure of Mo-MOFs on the structure, physicochemical properties and in vitro biocompatibility of hydrogels was studied. These biomaterials showed a super absorbent performance (higher than 2000 ± 169%) and a high degree of reticulation (higher than 75 ± 6%). The microstructure of the composites showed a granular morphology with some porosity. These composites were degraded entirely by hydrolysis at pH 5 and pH 7 at room temperature in time lapses shorter than 15 days. Also, they were biocompatible with porcine dermis fibroblasts not showing cytotoxic effects up to 48 h of incubation allowing its proliferation, and it was observed that the MOF containing L-tryptophan improved notably the biocompatibility of the collagen/guar gum matrix. Finally, the matrixes were tested as vehicles for cell encapsulation and release. The slow-release rates show that fibroblasts tend to remain inside the hydrogel matrixes. Thus, these materials are more suitable for cell scaffolds and tissue engineering applications such as wound healing dressings.
Incorporation of Se (IV) Complexes based on Amino Acids in Biomatrixes in Hyd...IIJSRJournal
Selenium is a non-metal that shows biological interest since it is responsible for modulating various proteins at the micronutrient level in living beings. In this work, new complexes based on the Se (IV) ion with amino acids such as phenylalanine (Se-F), histidine (Se-H) and tryptophan (Se-T) were hydrothermally synthesized and characterized. These were incorporated into biomatrixes based on semi-interpenetrated polymeric networks (Semi-IPN) of collagen-polyurethane-guar gum (CPGG) by the microemulsion process using a mass ratio of 1 wt.% with respect to collagen. The structural and crystalline characteristics that the selenium-amino acid complexes show a performance in modulating the properties of the biomatrixes under study. The results indicate that the incorporation of the complex decreases the crosslinking of the hydrogel, generating granular surfaces with porosity dependent on the type of amino acid. The CPGG Se-T biomatrix shows a swelling capacity of 10200 ± 1100 higher than the CPGG base matrix; while the CPGG Se-F and CPGG Se-T biomatrixes present slow degradation at both physiological and acidic pH. Interestingly, the matrix that includes the Se-F complex significantly stimulates the metabolic activity of L929 fibroblasts for up to 48 h, stimulating their proliferation. The fibroblasts encapsulated on these novel biomatrixes show recurrent release capacity for up to 7 days, where the structure of the CPGG Se-H biomatrix exhibits greater release from the encapsulated cells. These results demonstrate that these innovative biomatrixes could be used in biomedical applications such as dermal tissue regeneration and cell release for a specific biological fate.
Machine Learning Based House Price Prediction Using Modified Extreme Boosting IIJSRJournal
In recent years, machine learning has become increasingly important in everyday voice commands and predictions. Instead, it provides a safer auto system and better customer assistance. As a result of all that has been demonstrated, ML is a technology that is becoming more and more popular in a range of industries. To gauge changes in house values, the House Price Index is frequently employed (HPI). Due to the substantial correlation that exists between property prices and other variables, such as location, region, and population, the HPI on its own is not sufficient to accurately forecast a person's house price. Some studies have successfully predicted house prices using conventional machine learning techniques, but they seldom evaluate the efficacy of different models and ignore the more complicated but less well-known models. We proposed Modified Extreme Gradient Boosting as our model in this study due to its adaptive and probabilistic model selection process. Feature engineering, hyperparameter training and optimization, model interpretation, and model selection and evaluation are all steps in the process. Home price indices, which are frequently used to support real estate policy initiatives and estimate housing costs. In this project, models for forecasting changes in home prices are developed using machine learning methods.
Preliminary Evaluation on Vegetative of Rambutan (Nephelium lappaceum) in San...IIJSRJournal
The study was initiated to evaluate the early performance of rambutan (Nephelium lappaceum) vegetative planted on marginal sandy tin-tailing soil. The experiment was carried out for one year in a plot of 4-year-old rambutan cultivar at MARDI Kundang, Rawang, Selangor, Malaysia. Varieties of Mutiara Merah and Mutiara Wangi were used. Data from the plants as a measurement of vegetative growth was recorded. Mutiara Merah proved that it can be well-grown and cultivated on sandy tin-tailing soil. The plant height of Mutiara Merah indicated the highest significant reading. The parameter of canopy width showed the same variety contributed to the highest record. Nevertheless, Mutiara Merah contributed to the highest significant reading on stem diameter and perimeter respectively. Chlorophyll content in leaves of the plant of the same variety recorded the highest SPAD reading. Further field evaluations are needed to determine the relationship of fertilizer level with the different varieties in inducing the growth and yield of rambutan planted in marginal soil.
Analysis of Physicochemical and Microbiological Parameters of Wine Produced f...IIJSRJournal
Wine is a fermented drink made by the controlled culture of yeasts on fruit juices. This study was undertaken to produce acceptable wines from blends of banana and pineapple by the fermentative action of Meyerozyma guilliermondii strain 1621 and Pichia guilliermondii strain PAX-PAT 18S. The fermentation process lasted for a period of 28 days and, the aging process was for 2 months. The fermentation process comprised two set ups- one was fermented by Meyerozyma guilliermondii strain 1621 and the other was fermented by Pichia guilliermondii strain PAX-PAT 18S. The process was monitored and controlled by carrying out physicochemical analysis (pH, temperature, specific gravity, total titratable acidity, and alcohol content) and yeast count using standard methods. There was a decrease in the pH for both wines and an increase in the total titratable acidity. The temperature was between 17 and 27 0C for both wines. The specific gravity of the wines decreased during the fermentation leading to an increase in alcohol production. There was an increase in yeast count from 6.7×107 sfu/ml to 1.8×108 sfu/ml between days 1 and 17 and a decrease from 1.8×108 sfu/ml to 0 sfu/ml between days 17 to 85 for Meyerozyma guilliermondii; also an increase from 5.1×107 sfu/ml to 1.7×108 sfu/ml from day 1 to 17, and a decrease from 1.7×108 sfu/ml to 0 sfu/ml between day 17 to 85 for Pichia guilliermondii. Statistically, there was no significant difference between the yeast counts, temperature, pH, total titratable acidity, and specific gravity but there was signa ificant difference between the alcohol production for both wines. This study shows that wines can be successfully produced using Meyerozyma guilliermondii strain 1621 and Pichia guilliermondii strain PAX-PAT 18S.
Cohesive and Thermal Properties of Sodium Cyanide-Halide Mixed Crystals IIJSRJournal
In order to analyse the cohesive and thermal properties of sodium cyanide-halide mixed crystals an Extended Three Body Force Shell Model (ETSM) has been applied by incorporating the effect of translational-rotational (TR) coupling. We have conducted theoretical research on cohesive and thermal properties, such as cohesive energy (, molecular force constant (f), compressibility (), Restrahlen frequency (, Debye temperature (D), Gruneisen parameter (), Moelwyn Hughes constants (F1) and the ratio of volume thermal expansion coefficient (v) to volume specific heat (Cv), as a function of temperature within the temperature range 50K T 300K at concentration x=0, 0.27, 0.58 and 1. The current model computations and the findings of the available experiments are in good agreement. The ETSM is a sufficiently realistic model and may be applied to a variety of other mixed crystals in this family.
Discussion on Analysis of Effects of Short-Form Video Advertising on the Purc...IIJSRJournal
The purpose of this study is to investigate the impact of informativeness, entertainment, credibility, social interaction, incentives, and irritation of short-form video advertising on social media on the purchase intention of Gen Z in Vietnam through user attitude and advertising value. The methodology is conducting a survey by collecting responses from 1257 respondents who are Gen Z and familiar with social media, which was later analysed using SmartPLS. The main findings are advertising value and user attitude significantly affect customers’ purchase intention; advertising value is directly affected by informativeness, entertainment, and credibility; user attitude is directly affected by social interaction, incentives, and irritation. Finally, the research team proposes some solutions for businesses to increase the purchase intention of Gen Z in Vietnam through short-form video advertising on social media.
Comparison of Glucose in Urine with Likening of Pigeons as Pets IIJSRJournal
If someone is liking pigeons as pets, this may be due to their intelligent, effortless, and loving nature. The chief objectives of this study were to relate pigeon lovers as a pet with the level of glucose in their urine. Around 100 students of Bahauddin Zakariya University Multan Pakistan were participants of this study. Pee has glucose that is measured for measuring the glucose in urine. If glucose is not present in the urine it shows the kidney is working well. There is no major effect of glucose in urine with the love of a pigeon as a pet.
Non-unique Fixed Points of Self Mappings in Bi-metric Spaces IIJSRJournal
In this paper, we prove a few non-unique fixed-point results of mapping on a set with bi-metrics using θ – contraction. We also give an example that justifies our results. In the literature, our result generalized many results.
Research on the Impact of Short-Form Video Advertising on Social Media on the...IIJSRJournal
In recent years, short-form video has become a popular form of advertising on social media. The way consumers make decisions to purchase has changed owing to this new marketing method. This study aims to investigate the impact of informativeness, entertainment, credibility, social interaction, incentives and irritation of short-form video advertising on social media on the purchase intention of Gen Z in Vietnam through user attitude and advertising value. A survey was conducted by collecting responses from 1257 respondents who are Gen Z and familiar with social media, which was later analysed using SmartPLS. The findings revealed that advertising value and user attitude significantly affect customers’ purchase intention. In addition, advertising value is directly affected by informativeness, entertainment and credibility. Meanwhile, user attitude is directly affected by social interaction, incentives and irritation. Finally, the research team propose some solutions for businesses to increase the purchase intention of Gen Z in Vietnam through short-form video advertising on social media.
Can Perfume Allergy Cause Glycosuria? IIJSRJournal
The main aim of this research is to correlate relation between ornament allergy and glycosuria. Glycosuria is a process in which glucose is removed from urine. The value of glucose in blood must be less than 7 mmol/L. Glycosuria is caused by diabetes, high sugar diet, emotion and liver cirrhosis. Some people are sensitive to some fragrances or ornaments when they come in contact with these ornaments, they show marks of allergy like disease in respiratory track, fever, rashes and headache. The best treatment is to avoid such ornaments having unpleasant sharp smell which cause rashes. 17% males have glucose in urine and show perfume allergy while 1.25% females have glucose in urine and have perfume allergy.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
2. Asian Journal of Applied Science and Technology (AJAST)
Volume 6, Issue 2, Pages 167-180, April-June 2022
ISSN: 2456-883X www.ajast.net
168
centralized pool of configurable computing resources (e.g., connections, data centers, memory, implementations,
as well as utilities) which can be actively maximized but also issued with little integration management and
engagement from telecommunications companies. Figure 1 depicts a simplified conceptual explanation of
cloud-based solutions. As shown in Figure 2, the infrastructure paradigm is consisting of five basic features, 3
different models, and four different deployment models. Customers in this technique lease the information to a
server located beyond company boundaries and overseen by a cloud operator. Memory, processors, connectivity, as
well as capacity are also accessible through the network by a customer [2]. Cloud technology is made up of several
techniques, including business architectures, configuration management, web 2.0, and several others.
Cloud technology raises several security problems. Nevertheless, enterprises need to have the cloud owing to the
necessity for numerous capabilities to be utilized in high demand and an absence of adequate resources in order to
meet the same need. Furthermore, cloud computing allows for very efficient information recovery as well as
accessibility. Resources optimization is being handled by the cloud service provider.
1.1. Characteristics of Cloud Computing
Cloud services have several distinct properties. The initial is on-demand self-service, in which a service customer
receives the capabilities they require that do not necessitate operator interaction or contact also with the cloud
platform [3-5]. This same central characteristic is large network accessibility that implies that information may be
accessible from almost anywhere using a conventional protocol using small or large companies with greater
including a cellular telephone, notebook, or personal computer. An additional feature is capacity sharing that
implies that facilities were aggregated to enabling over several users to utilize them. As in the multi-tenant model,
resources are released continuously to a user, but once completed, they could well be transferred to the next to meet
rising resource requirements. Even though customers were allocated to distributed resources, users need not
understand where such capabilities are located. Companies might understand the location to a greater extent,
including continent, region, and network infrastructure.
Figure 2. The architecture of a cloud environment
Service
Req.
Proc.
Server 2
Server 1 Server n
Server 1 Server 2 Server n
Trigger Engine
Controller
Client 1 Client 2 Client N
PPD
3. Asian Journal of Applied Science and Technology (AJAST)
Volume 6, Issue 2, Pages 167-180, April-June 2022
ISSN: 2456-883X www.ajast.net
169
Quick flexibility seems to be another property of cloud applications that implies that resources are automatically
raised whenever required as well as lowered when not. A quantified service is additionally one of the features
which a customer requires to understand what amount is used. It is additionally necessary for the cloud vendor to
understand the amount that the customer has utilized to bill them.
1.2. Service Models
There are three systems available. These features provided to the user vary across these variants. This could take the
shape of technology, frameworks, or infrastructure. Table 1 compares the performance of such alternatives to the
general framework.
Table 1. Assessment of cloud models to standard methods
S. No. Conventional Models Cloud Models
1.
Applications
Client-side applications
Client-server applications
Web interface to local server
applications
Data and processes reside on PC or on
local servers
End-user cloud services
Rich internet applications
Web 2.0 technologies
Software-as-a-service
Data and processes reside at the service provider
2.
Developer tools & techniques
Client-side development tool
Service-oriented architecture
Composite applications
Proprietary APIs
App-component-as-a-service
Internet-hosted software services that enable
mashups
Web-hosted development tools
Community development tools for shared
templates and codes
Proprietary service provider APIs
3.
Middleware
App servers
File and object stores
Databases
Integration servers
Software-platform-as-services
Hosted app platform
Hosted files, data, and object stores
Hosted databases
Software-integration-as-services
4. Asian Journal of Applied Science and Technology (AJAST)
Volume 6, Issue 2, Pages 167-180, April-June 2022
ISSN: 2456-883X www.ajast.net
170
4.
Physical Infrastructure
Severs
Disks
Network
System management
Virtual-infrastructure-as-services
Virtual servers
Storage sharing
VLAN Configuration
Management-as-a-service
Software as a Service (SaaS) - Within that solution, the cloud-based service provider offers customers cloud-based
software architecture such that they could utilize this for developing programs on the network infrastructure.
Because users can indeed execute or consume such applications, they still did not influence the underlying
technology as well as the physical environments of the clouds, including the networking, OS, as well as memory
[6-11]. This provider of cloud services is now in control of managing multiple hardware settings but without
customer interaction. The user may use an internet browser to connect to a program like a client application (Figure
3).
Figure 3. SaaS and non-SaaS models
Platform as a Service (PaaS) - Comparable to SaaS because the technology is managed mostly by cloud providers,
however, this solution differs in that customers may install their own personal applications. Inside this architecture,
customers may use the cloud platform company's application for downloading or distributing any own apps. Every
cloud-based service provider controls or restricts issues, for example, although each user controls application
settings.
IaaS (Infrastructure as a Service) - Computational resources including processors, memory, as well as networking
could well be supplied using this application. Whatever random OS may be installed and used by an IaaS
application. Users may indeed build or distribute apps upon the OS. Cloud solutions like Amazon EC2 are
implementing similar strategies but also billing the customers on the number of resources used.
2. The Most Serious Threats to Cloud Computing
There are several concerns with cloud technology. Accidental deletions, information leakage, hostile hackers, the
unsecured interface as well as APIs, user or security weaknesses, data location, but also denial of service are among
the concerns highlighted. Figure 4 depicts the risks associated with using the cloud [12-14].
Non-SaaS
Application
SaaS
Application
Application logic runs
on user’s computer
Application logic runs
on the cloud
5. Asian Journal of Applied Science and Technology (AJAST)
Volume 6, Issue 2, Pages 167-180, April-June 2022
ISSN: 2456-883X www.ajast.net
171
Figure 4. Possible Cloud computing threats
A. Loss of information
Businesses were transferring all of their sensitive information to cloud internet services. Considering the relatively
inexpensive rates that the cloud provides, users must've been careful neither to disclose critical information to
threats due to the numerous possibilities that could breach the information. The dangers in cloud technology were
increasing as a result of hazards that seem to be unique to the internet which has not occurred in conventional
devices, as well as difficulty in avoiding such vulnerabilities. There are various chances for information leakage
because of a hostile assault, network breakdowns, or unintended erasure even by an operator lacking archives.
Losses could be caused by natural disasters including an explosion or a catastrophe. Furthermore, whatever
occurrence of damages its cryptographic keys may cause the loss of information. There are numerous ways
recommended by CSA to secure the information:
Using a robust API to ensure access.
Encrypting and safeguarding information integrity as it travels through the route.
Examining information security at operation and designing times.
Adherence to strict key creation, storing, disposal, as well as standard operating procedures.
Demanding that the provider delete any permanent multimedia content before pooling.
Defining backups as well as recovery procedures.
B. Destruction of Data
A cloud infrastructure contains multiple users and businesses, all of which information is kept at the same location.
Every compromise in this cloud infrastructure could disclose all individuals' and businesses' information. Users
employing various apps on virtual servers may access the same databases because of multi-tenancy, as well as any
damage incident that happens to it may impact users who utilize the same databases. Furthermore, SaaS companies
also stated that their information is more secure compared to that of traditional suppliers.
6. Asian Journal of Applied Science and Technology (AJAST)
Volume 6, Issue 2, Pages 167-180, April-June 2022
ISSN: 2456-883X www.ajast.net
172
Figure 5. Increase in cybersecurity incidents in 2019
An insider may acquire data from a wide variety of methods; they can obtain information informally through
obtaining a great deal of information on the clouds, as well as an event that might render the platform unsafe and
therefore exposes users' information. According to the 2011 Data Breach Investigations Report, hacking and
ransomware are among the most prevalent sources of security breaches, with 50% being phishing and 49% being
ransomware. Figure 5 depicts the increase in data incidents in 2019.
C. Malicious Insiders
Malicious insiders are individuals who have access to sensitive information and therefore are allowed to administer
it, including computer programmers or members of the business providing cloud-based services. Such individuals
may acquire as well as destroy information whether they have been hired by many other firms or simply wish to
harm a business. Although cloud computing providers could be unaware of this due to the incapacity to manage
their personnel. CSA has presented several alternatives.
Conducting detailed supplier performance and tightening management of supply chain ID.
Promote a better understanding of human resource needs as a component of the legal arrangement.
Increasing transparency in data protection as well as all software solution operations.
Creating a procedure for notifying whenever privacy violations occur.
D. Insecure APIs and interfaces
The API is used to communicate seen between the cloud service provider and the client, allowing the customer to
manage and supervise the information. As a result, such connections must be secured to prevent unauthorized
access. When they are insufficient and the security features are incapable of defending these, it could result in
resources being accessed even though they are strong passwords. CSA has several options for preventing unsafe
interfaces as well as APIs:
7. Asian Journal of Applied Science and Technology (AJAST)
Volume 6, Issue 2, Pages 167-180, April-June 2022
ISSN: 2456-883X www.ajast.net
173
Examining the service company's defense in depth for interfacing.
Ensuring effective identity management and security while transmitting data.
Recognizing API interconnections.
E. Account or service theft
People accessed passwords to log in to cloud storage capabilities, therefore when their credentials are hacked or
seized, the credentials were inevitably mishandled as well as changed. An unauthorized user with passwords may
acquire the customers' information to acquire, modify, or destroy it, or even to market it to other individuals.
Numerous ways are recommended by CSA to avoid accounts or security weaknesses:
Preventing individuals from disclosing their identities.
To use a two-factor authentication protocol.
Monitoring all activity to identify unwanted entries.
F. Data Storage
Cloud companies have many data centers scattered around the globe. Data location is indeed a problem in cloud
applications because cloud consumers have to understand exactly the information is hosted. Regardless of the
jurisdiction, several nations compel corporations to retain user information in the nation. There are additional rules
in various nations regarding which the corporation may keep its information. Additionally, information placement
is essential whenever user information is housed inside an area prone to conflicts or calamities. Figure 6 depicts
public views on cloud computing security.
Figure 6. Cloud security perceptions
G. Denial of Service
Many companies want computer networks to remain readily available at all times since these major services
businesses offer to rely on them. Such a provider of cloud-based services offers support that is pooled by several
8. Asian Journal of Applied Science and Technology (AJAST)
Volume 6, Issue 2, Pages 167-180, April-June 2022
ISSN: 2456-883X www.ajast.net
174
customers. When an intruder consumes the resources, users will be unable to utilize them, resulting in a denial of
service and perhaps slowing the availability of those resources. Users that use cloud computing and therefore are
victimized by the network may indeed seek to interrupt the operation of these other companies.
2.1. Cloud Multi-tenancy
Multi-tenancy is seen as an essential factor in cloud computing by the CSA as well as ENISA. Nevertheless, despite
the numerous advantages of multi-tenancy, there are several issues related to running over than single tenant solely
on a single physical computer that is essential to leverage its architecture. Renters may assault each another as they
reside in the same structure. Traditionally, any exploit might exist between two distinct physical machines;
however, since 2 or even more renters share the very same infrastructure, an offender as well as victims could now
exist within the same location. Figure 7 depicts the distinction between multi-tenancy and conventional situations.
The technique is employed to isolate renters between them by constructing a virtual border for every client.
Nevertheless, virtualization has a number of flaws.
Figure 7. Traditional and Multi-Tenancy Cases
3. Review of Literature
Some of the methodologies for secured communication in cloud infrastructure are discussed here [15-18]. The
researchers evaluated a multi-cloud system for data reliability as well as identity management. A multi-cloud
architecture could provide multiple storage options. Therefore, reliability must be maintained. Numerous proven
information access approaches have emerged for that purpose. For cloud-based solutions, the researchers reported
Security as a Service instead. This suggested system handles audits as well as implements Service Level
Agreements (SLAs) that are mutual contracts among cloud vendors and cloud consumers. Investigators presented a
way for proving information assets with minimal proof ideas that might secure information integrity. Despite
rigorous encryption techniques, this approach maximized throughput. Researchers contributed to a cryptographic
algorithm that could be utilized to improve the security of cloud computing. Investigators provided a safe and
adaptable architecture for improving cloud infrastructure.
The researchers also concentrated on multi-cloud storing challenges and offered a method for data integrity
assurance. The approach is referred to as a proven management control system. Researchers helped to save
9. Asian Journal of Applied Science and Technology (AJAST)
Volume 6, Issue 2, Pages 167-180, April-June 2022
ISSN: 2456-883X www.ajast.net
175
computer records which could be utilized to improve cloud-based services. The researchers developed a
hardware-based way to prove information custody. This system ensures data integrity as well as timeliness. The
researchers looked at safe information transfer in cloud-based solutions. They presented a paradigm provided by
cloud integrity to do this. Cybersecurity - mediators used in a comparable type of activity. Clod information
security is provided by the use of watermarking.
There is an excellent overview of numerous approaches to maintaining data security in a multi-cloud context.
Remote Data Possession (RDP) with authorization was established for cloud information protection as well as
flexibility. Researchers introduced a novel flavor of the PDP (O-PDP) method that employs 6-time complexity
techniques in their PDP method. In addition to the capability to minimize data malpractices, the method is intended
towards identifying damaged data or recovering damaged units.
To establish the concept of verifiable information privacy, researchers employed online codes (something of an
erasing coding) in the manner that damaged information may be retrieved utilizing part of the encrypted
information that was accessible. The system employs a mix of verifiable data possession as well as the encoding
process. The researchers contend that the system was strong because two primary reasons. Users, as a consumer,
may identify data degradation and retrieve damaged data.
The method consists of four phases pre-processing, task generation (clients), evidence of ownership (host), and
validation (client). This study contributes to the safeguarding of leased information within the context of
cloud-based solutions or any other kind of sourcing. The effectiveness of O-PDP pre-processing and trial time with
each block size, as well as recognition rate versus frequency of requests blocks, are still the main outcomes of this
study.
4. Assessment of The Security Model
4.1. Data Integrity Protection
Users of cloud environments often believe that if their data is protected before being transmitted to the clouds, that
is safe. While cryptography offers excellent secrecy regarding cloud infrastructure attacks, it fails to protect the
information from destruction done by technical indicators and application defects. There have been basically two
methods for confirming the accuracy of data that has been leased to a distant server. A user or related parties may
verify the authenticity of the information.
The first step is to obtain the file and thereafter verify the hash code. An asymmetric cryptographic coding
technique is employed throughout this manner. MAC techniques use 2 parameters, a private key and a configurable
piece of information, and create a single response, a MAC (tag). The procedure is therefore executed mostly on the
user's computer. After obtaining a MAC, a data controller transfers the information into the cloud. The owner
receives the data blocks, determines the MAC for it, and matches it to the one that was generated before contracting
that information to ensure its authenticity.
This approach detects both unintentional as well as purposeful alterations. Furthermore, by utilizing the password,
the information's validity is safeguarded, while only the person with the passcode may examine the information's
10. Asian Journal of Applied Science and Technology (AJAST)
Volume 6, Issue 2, Pages 167-180, April-June 2022
ISSN: 2456-883X www.ajast.net
176
reliability and authenticity. Obtaining and computing the MAC of a huge document is a time-consuming yet
difficult task. It is additionally inconvenient because it uses additional traffic. As a result, a simpler approach to
determine its hash number is required.
The other is to use a hashing tree to calculate the hash code in the clouds. The hashing tree is formed from bottom to
top with this approach, where the branches contain the information and the parent is indeed hashed till the roots are
achieved. The database administrator only keeps the base. Whenever the owner wishes to double-check the
information, he requests only the root value and matches it to the one that he possesses. This is not realistic to a
certain degree since calculating the hash code of a large number of items uses additional processing. Whenever the
given resource is only memory without processing, the client may download it as in the previous scenario, or
transfer it to another third person, using additional capacity. As a result, a method for verifying information
integrity yet conserving traffic and compute resources is required. Distributed data audits that investigate the
information integrity or accuracy of distantly stored data have lately gained popularity.
A. Third-Party Auditor
A third-party auditor (TPA) is an individual who possesses the knowledge and competence to conduct certain audit
work, as shown in Figure 8. The TPA system is employed to maintain integrity. Due to the number of events
involving questionable acts, cloud service customers utilize third-party audits.
Figure 8. Third-party auditing infrastructure
The suggested approach ensures integrity as well as information protection for the data controller. The
administrator is informed of all of his cloud systems. As a result, the technique ensures the information integrity of
all owner's properties on the clouds. The information owner is involved in the audit work under this arrangement.
To begin, TPA employs standard audit processes. When agents detect any modifications to the information, they
inform the owner. To confirm such modifications, the administrator examines the auditing process records. If the
owner feels that odd activities have occurred using their information, he may inspect it personally or have an
additional audit appointed to them do so. As a result, the operator is constantly monitoring any changes to his
personal information. There exists a set threshold that such a third-party examiner's answer must not surpass. All
11. Asian Journal of Applied Science and Technology (AJAST)
Volume 6, Issue 2, Pages 167-180, April-June 2022
ISSN: 2456-883X www.ajast.net
177
adjustments that fall below or are equivalent to this level are validated by the data controller. Whereas if time
surpasses that limit, the information owner will be obligated to do unexpected audits.
B. Provable Data Possession
This approach uses statistical demonstrations to verify ownership by randomly assigning a collection of frames out
from servers. Researchers employed an RSA-based homomorphic verified tagging, whereby aggregates tagging to
generate a communication that the customer may employ to establish that perhaps the servers possess a given item,
irrespective no matter whether the user possesses accessibility or not to it. Regardless of the advantages of such a
system, research failed to address dynamic memory storing, resulting in calculation and transmission delay inside
the servers due to the complete file RSA numeration.
C. Methodology, Provider of Cloud Services & Authentication
Regular individuals and businesses that have information to keep on the internet and depend just on the network for
information processing may both be examples of clients. A CSP manages and owns genuine cloud-based services
and seems to have significant experience and resources in building and maintaining decentralized cloud service
systems.
When asked, an additional TPA with expertise and skills which customers might not possess is entrusted to
evaluate as well as expose the danger of cloud-based storage services in consumers' accounts. This study looks at
the safety of cloud-based information storage that is effectively a decentralized backup system. A flexible and
efficient decentralized infrastructure featuring explicit dynamic supporting documentation, encompassing blocks
updating, deletion, and appending, has been proposed to ensure the correctness of client information stored in
cloud-based data storage. Use erasure-correcting coding in document dissemination preparations to provide a
redundant integrity vector and assure information trustworthiness.
They practically ensure the simultaneous identification of the offending server by integrating the homomorphic key
with decentralized verification of erasure encrypted data. As per comprehensive security and speed testing, this
solution is exceptionally effective and resistant to failure, malware change attacks, or even server collusion
intrusions.
Various cloud elements often link to one another via applications programming interfaces, particularly cloud
hosting, in the cloud environment, defined as the computer design of software products that are responsible for
providing cloud applications. This is similar to the UNIX concept of having multiple programs each of which
performs a particular task well enough and interacts with the others via global connections. The resultant
technologies are much more controllable than monolithic equivalents since the complexities are managed.
A PKC-based homomorphic authenticator (e.g., a BLS signature or an RSA signature-based authenticator) is
suggested to provide open integrity to the validation procedure. The main definition demonstrates this method
using information dynamics assistance using a BLS-based strategy. The root hashing, in addition to the file set's
total dimensions as well as component capacity, has now become the only item of data in the system that must
originate from a reliable source. Any fragmentation may be checked by a user who merely has the root hashing of a
12. Asian Journal of Applied Science and Technology (AJAST)
Volume 6, Issue 2, Pages 167-180, April-June 2022
ISSN: 2456-883X www.ajast.net
178
document set. It begins by determining the hashing of the block supplied to it. Since cloud services may manage
multiple validation chances from various companies simultaneously, it becomes more practical to combine each of
these patterns into a simple single one and validate it all simultaneously. This may be performed in a multiclient
environment by enabling proven data changes and validation. Table 2 presents a comparison of several methods to
cloud information security.
Table 2. Comparison of various approaches
Investigation Techniques Explanations Disadvantages
Privacy preserved
secure and dependable
cloud data storage
MAC Ensures data integrity
Not suitable for higher data
files
Secured hash standard
Hash
Algorithm
Stores the root hash of
trees to authenticate
received data
No assurance regarding the
correctness of other
outsourced data
Robust data security for
cloud while using TPA
RSA,
SHA-512
Design algorithm for
data manipulations,
insertion of records,
and record deletions
If anyone deletes the
records, this algorithm
stops working
A secure index
management scheme for
providing data sharing
in cloud storage
Proxy
re-encryption
Identify the users
accessing the records
-
Provable data possession
at untrusted store
RSA-based
homomorphic
authenticator
Ensures possession of
data files on unsecured
memory
May leak user information
to auditors, while using
directly
Privacy-preserving
public auditing for
secure cloud storage
Random mask
approach
Bilinear aggregate
signatures, TPA
performs multiple
audit tasks
simultaneously
-
Towards publicly
auditable secure cloud
data storage services
Proof of
retrievability
A single key is utilized
regardless of the size of
the files
Needs higher resource costs
for implementation
13. Asian Journal of Applied Science and Technology (AJAST)
Volume 6, Issue 2, Pages 167-180, April-June 2022
ISSN: 2456-883X www.ajast.net
179
5. Conclusion
Cloud technology has proven to be one of the extremely successful implementations for the improvement of
organizational performance. Because organizations have a significant amount of information to contain, cloud
computing offers room to users by also allowing them to retrieve their information from anywhere at any moment
in a simple manner. This paper suggests that enhanced utilization of cloud applications for information storage
undoubtedly continues to increase the phenomenon of enhancing information storage methods inside the data
center. Also, as individuals save their personally identifiable information as well as significant applications to the
cloud, storing the information securely is becoming a major concern. This paper recommends that information
stored in the cloud may be put at risk if not properly safeguarded. There are numerous existing techniques for
effectively implementing protection in the cloud. This study offers an overview and discussion of cloud technology
and security concerns, as well as strategies for strengthening cloud infrastructure encryption methods.
Declarations
Source of Funding
This research did not receive any grant from funding agencies in the public, commercial, or not-for-profit sectors.
Consent for publication
Author declares that he/she consented for the publication of this research work.
References
[1] A. Aviram, S. Hu, B. Ford, and R. Gummadi (2010). Determinating timing channels in compute clouds. In
Proceedings of the 2010 ACM workshop on Cloud computing security workshop, Pages 103–108.
[2] A. Bessani, M. Correia, B. Quaresma, F. Andr´e, and P. Sousa (2013). Depsky: dependable and secure storage
in a cloud-of-clouds. ACM Transactions on Storage (TOS), 9(4): 12.
[3] A. Corradi, M. Fanelli, and L. Foschini (2014). VM consolidation: A real case based on openstack cloud. Future
Generation Computer Systems, 32: 118–12.
[4] Anil Lamba (2018). Protecting “cybersecurity & resiliency” of nation’s critical infrastructure - energy, oil &
gas. International Journal of Current Research, 10(12): 76865–76876.
[5] S. Farné, F. Benzi, and E. Bassi (2020). IIoT Based Efficiency Optimization in Logistics Applications. Asian
Journal of Basic Science & Research, 2(4): 59–73. doi: 10.38177/ajbsr.2020.2406.
[6] Satinderjeet Singh, Anil Lamba and Sivakumar Sai Rela Muni (2019). DSSE: distributed security shielded
execution for communicable cyber threats analysis. International Journal of Current Research, 11(04): 3274–3282.
[7] Anil Lamba (2019). 8 Steps to Protect against Rising Third Party Cyber Risks. Cybernomics, 1(5): 29–31.
[8] C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou (2012). Toward secure and dependable storage services in
cloud computing. Services Computing, IEEE Transactions on, 5(2): 220–232.
14. Asian Journal of Applied Science and Technology (AJAST)
Volume 6, Issue 2, Pages 167-180, April-June 2022
ISSN: 2456-883X www.ajast.net
180
[9] S. Alangari and N. Ahmed Khan (2021). Artificially Intelligent Warehouse Management System. Asian Journal
of Basic Science & Research, 3(3): 16–24. doi: 10.38177/ajbsr.2021.3302.
[10] C.-K. Chu, S. S. Chow, W.-G. Tzeng, J. Zhou, and R. H. Deng (2014). Key-aggregate cryptosystem for
scalable data sharing in cloud storage. IEEE Transactions on Parallel and Distributed Systems, 25(2): 468–477.
[11] D. Catteddu (2010). Cloud computing: benefits, risks and recommendations for information security. In Web
Application Security, Springer, Pages 17.
[12] Anil Lamba (2017). Deriving intelligent data analytics using anomaly detection framework for IoT network
and smart environments. International Journal for Technological Research in Engineering, 4(6): 5682–5686.
[13] J.Rani & G.Glorinda (2021). A Simplified Fractal Texture Analysis Approach using Quadtree Decomposition
with Huffman Coding Technique. Middle East Journal of Applied Science & Technology, 4(3): 01–09. doi:
10.46431/mejast.2021.4301.
[14] F. Zhang and H. Chen (2013). Security-preserving live migration of virtual machines in the cloud. Journal of
Network and Systems Management, 21(4): 562–587.
[15] Anil Lamba (2015). A study paper on security related issue before adopting cloud computing service model.
International Journal for Technological Research in Engineering, 3(4): 5837–5840.
[16] K. Pawar, C. Ambhika, and C. Murukesh (2021). IoT Hacking: Cyber Security Point of View. Asian Journal of
Basic Science & Research, 3(2): 01–09. doi: 10.38177/ajbsr.2021.3201.
[17] G. Ateniese, R. Di Pietro, L. V. Mancini, G. Tsudik (2008). Scalable and efficient provable data possession. In
Proceedings of the 4th international conference on Security and privacy in communication networks, Pages 9.
[18] G. Brunette, R. Mogull et al. (2009). Security guidance for critical areas of focus in cloud computing v2. 1.
Cloud Security Alliance, Pages 1–76.