Nowadays, applications running in virtual or cloud-based environments are all susceptible to exploitation. However, traditional trust solutions have not been fully optimized for virtualized third party environments. In this situation, the selection of an appropriate cloud service provider is an issue. This paper introduces a completely novel idea on most appropriate cloud service selection through an intermediator. It is based on the new notion of a marketspace. Our paper is devoted to the investigation of a novel architecture suggested for a marketspace. Several theoretical notions related to trust have also been explained extensively in the paper for Cloud service provider selection.
The document summarizes and compares various pricing models used in cloud computing. It discusses key cloud computing concepts like service models (IaaS, PaaS, SaaS) and characteristics. It then reviews several proposed pricing models and schemes, comparing factors like fairness, quality of service, and pricing approach. Most proposed models are theoretical and not implemented, though simulations show promise. Most also favor the service provider over customers. The document aims to provide a foundation for designing improved future pricing models.
Priority Based Prediction Mechanism for Ranking Providers in Federated Cloud ...IJERA Editor
In Current trends the Cloud computing has a lot of potential to help hospitals cut costs, a new report says. Here‟s some help overcoming some of the challenges hiding in the cloud. Previously there several methods are available for this like Broker based trust architecture and etc. Health care framework which are patient, doctor, symptom and disease. In this paper we are going to discuss the broker based architecture for federated cloud and its Service Measurement Index considered for evaluating the providers,construction of Grade Distribution Table(GDT),concept of ranking the providers based on prediction weights comparison, optimal service provider selection and results discussion compared with existing techniques available for ranking the providers. In this paper we are going to propose, two different ranking mechanisms to sort the providers and select the optimal provider automatically. Grade distribution ranking model is proposed by assigning the grade for the providers based on the values of SMI attributes, based on the total grade value, providers falls on either Gold, Silver or Bronze. Each category applies the quick sort to sort the providers and find the provider at the top is optimal. If there is more than one provider at the top, apply priority feedback based decision tree and find the optimal provider for the request. In the second ranking mechanism, joint probability distribution mechanism is used to rank the providers, two providers having same score, apply priority feedback based decision tree and find the optimal provider for the request.
DESIGNING ASPECT AND FUNCTIONALITY ISSUES OF CLOUD BROKERING SERVICE IN CLOUD...Souvik Pal
Cloud brokering service is an intermediate service which enables the producer-consumer business model
enforcing the easy access to cloud services from Cloud Service Providers (CSPs). Cloud broker is to
provide a platform where broker collects the information from the user, analyze the data, and sends those
data to the CSPs. Cloud broker also provides data integration services and modeling the data across all the
components or units of the cloud services. This paper deals with designing criteria and issues of cloud
broker, system activity of broker, and sequence diagram of system design with implementation procedure.
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutionsijccsa
The document summarizes security issues related to the software as a service (SaaS) model of cloud computing. It discusses traditional security challenges like authentication, authorization, availability and data confidentiality that also affect the SaaS model. It also describes new security issues introduced by the cloud computing paradigm, such as data being stored across multiple locations and servers owned by different providers. The document analyzes these security challenges and proposes some potential solutions discussed in other literature.
SelCSP: A Framework to Facilitate Selection of Cloud Service Providers1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Requirements and Challenges for Securing Cloud Applications and ServicesIOSR Journals
This document discusses the requirements and challenges for securing cloud applications and services. It begins with an abstract that introduces cloud computing security as complex due to many factors. The document then provides context on cloud computing architectural frameworks and models to help evaluate security risks when adopting cloud services. It discusses key aspects of cloud architecture like deployment models, service models, and multi-tenancy that impact security. Understanding these relationships is important for informed risk management decisions regarding cloud adoption strategies.
Blockchain enabled task and time sheet management for accounting services pro...Conference Papers
This document describes a blockchain-enabled timesheet management system for accounting firms. It aims to improve on traditional centralized timesheet databases which are vulnerable to tampering. The proposed system uses blockchain to immutably store task and timesheet data, including check-in/out times. This ensures accuracy and avoids issues like overclaiming hours. The document outlines the system architecture, which features a frontend app and blockchain backend on Hyperledger Fabric. Timesheet records are added to the blockchain using smart contracts. Preliminary results found blockchain improved aspects like organizational management, cost savings, transparency and data security compared to traditional methods.
A cloud broker approach with qos attendance and soa for hybrid cloud computin...csandit
Cloud Computing is the industry whose demand has been growing continuously since its
appearance as a solution that offers different types of computing resources as a service over the
Internet. The number of cloud computing providers grows into a run, while the end user is
currently in the position of having many pricing options, distinct features and performance for
the same required service. This work is inserted in the cloud computing task scheduling
research field to hybrid cloud environments with service-oriented architecture (SOA), dynamic
allocation and control of services and QoS requirements attendance. Therefore, it is proposed
the QBroker Architecture, representing a cloud broker with trading features that implement the
intermediation services, defined by the NIST Cloud Computing Reference Model. An
experimental design was created in order to demonstrate compliance to the QoS requirement of
maximum task execution time, the differentiation of services and dynamic allocation of services.
The experimental results obtained by simulation with CloudSim prove that QBroker has the
necessary requirements to provide QoS improvement in hybrid cloud computing environments
based on SOA.
The document summarizes and compares various pricing models used in cloud computing. It discusses key cloud computing concepts like service models (IaaS, PaaS, SaaS) and characteristics. It then reviews several proposed pricing models and schemes, comparing factors like fairness, quality of service, and pricing approach. Most proposed models are theoretical and not implemented, though simulations show promise. Most also favor the service provider over customers. The document aims to provide a foundation for designing improved future pricing models.
Priority Based Prediction Mechanism for Ranking Providers in Federated Cloud ...IJERA Editor
In Current trends the Cloud computing has a lot of potential to help hospitals cut costs, a new report says. Here‟s some help overcoming some of the challenges hiding in the cloud. Previously there several methods are available for this like Broker based trust architecture and etc. Health care framework which are patient, doctor, symptom and disease. In this paper we are going to discuss the broker based architecture for federated cloud and its Service Measurement Index considered for evaluating the providers,construction of Grade Distribution Table(GDT),concept of ranking the providers based on prediction weights comparison, optimal service provider selection and results discussion compared with existing techniques available for ranking the providers. In this paper we are going to propose, two different ranking mechanisms to sort the providers and select the optimal provider automatically. Grade distribution ranking model is proposed by assigning the grade for the providers based on the values of SMI attributes, based on the total grade value, providers falls on either Gold, Silver or Bronze. Each category applies the quick sort to sort the providers and find the provider at the top is optimal. If there is more than one provider at the top, apply priority feedback based decision tree and find the optimal provider for the request. In the second ranking mechanism, joint probability distribution mechanism is used to rank the providers, two providers having same score, apply priority feedback based decision tree and find the optimal provider for the request.
DESIGNING ASPECT AND FUNCTIONALITY ISSUES OF CLOUD BROKERING SERVICE IN CLOUD...Souvik Pal
Cloud brokering service is an intermediate service which enables the producer-consumer business model
enforcing the easy access to cloud services from Cloud Service Providers (CSPs). Cloud broker is to
provide a platform where broker collects the information from the user, analyze the data, and sends those
data to the CSPs. Cloud broker also provides data integration services and modeling the data across all the
components or units of the cloud services. This paper deals with designing criteria and issues of cloud
broker, system activity of broker, and sequence diagram of system design with implementation procedure.
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutionsijccsa
The document summarizes security issues related to the software as a service (SaaS) model of cloud computing. It discusses traditional security challenges like authentication, authorization, availability and data confidentiality that also affect the SaaS model. It also describes new security issues introduced by the cloud computing paradigm, such as data being stored across multiple locations and servers owned by different providers. The document analyzes these security challenges and proposes some potential solutions discussed in other literature.
SelCSP: A Framework to Facilitate Selection of Cloud Service Providers1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Requirements and Challenges for Securing Cloud Applications and ServicesIOSR Journals
This document discusses the requirements and challenges for securing cloud applications and services. It begins with an abstract that introduces cloud computing security as complex due to many factors. The document then provides context on cloud computing architectural frameworks and models to help evaluate security risks when adopting cloud services. It discusses key aspects of cloud architecture like deployment models, service models, and multi-tenancy that impact security. Understanding these relationships is important for informed risk management decisions regarding cloud adoption strategies.
Blockchain enabled task and time sheet management for accounting services pro...Conference Papers
This document describes a blockchain-enabled timesheet management system for accounting firms. It aims to improve on traditional centralized timesheet databases which are vulnerable to tampering. The proposed system uses blockchain to immutably store task and timesheet data, including check-in/out times. This ensures accuracy and avoids issues like overclaiming hours. The document outlines the system architecture, which features a frontend app and blockchain backend on Hyperledger Fabric. Timesheet records are added to the blockchain using smart contracts. Preliminary results found blockchain improved aspects like organizational management, cost savings, transparency and data security compared to traditional methods.
A cloud broker approach with qos attendance and soa for hybrid cloud computin...csandit
Cloud Computing is the industry whose demand has been growing continuously since its
appearance as a solution that offers different types of computing resources as a service over the
Internet. The number of cloud computing providers grows into a run, while the end user is
currently in the position of having many pricing options, distinct features and performance for
the same required service. This work is inserted in the cloud computing task scheduling
research field to hybrid cloud environments with service-oriented architecture (SOA), dynamic
allocation and control of services and QoS requirements attendance. Therefore, it is proposed
the QBroker Architecture, representing a cloud broker with trading features that implement the
intermediation services, defined by the NIST Cloud Computing Reference Model. An
experimental design was created in order to demonstrate compliance to the QoS requirement of
maximum task execution time, the differentiation of services and dynamic allocation of services.
The experimental results obtained by simulation with CloudSim prove that QBroker has the
necessary requirements to provide QoS improvement in hybrid cloud computing environments
based on SOA.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...IRJET Journal
This document proposes a novel approach for secure group data sharing in cloud computing using a symmetric balanced incomplete block design (SBIBD). The approach aims to enable anonymous yet traceable data sharing among group members in the cloud. It uses the concept of group signature and SBIBD to efficiently generate a common group key for encrypting and decrypting shared data, providing security while supporting group data sharing. The SBIBD and group signature techniques are used to achieve privacy, security, traceability and efficient access control. Experimental results demonstrate the effectiveness of generating the group key and uploading/accessing encrypted files through the group manager. The proposed approach supports dynamic membership changes and is secure and efficient for group data sharing in cloud computing.
IRJET - An Intelligent Recommendation for Social Contextual Image using H...IRJET Journal
This document presents a research paper that proposes a hierarchical attention model called HASC for social contextual image recommendation. It identifies three key aspects (upload history, social influence, owner admiration) that affect users' preferences for images. A hierarchical attention network is designed to model these aspects and their relationships. Experimental results on real-world datasets show the model outperforms baselines in image recommendation. The paper aims to better capture complex user preferences by fusing social network information with image and user data.
Enhancing Data Integrity in Multi Cloud StorageIJERA Editor
Cloud computing is a way to increase the capacity or add capabilities dynamically without investing in new infrastructure, training new personnel, or licensing new software. Cloud is surrounded by many security issues like securing data and examining the utilization of cloud by the cloud computing vendors. Security is one of the major issues which reduce the growth of cloud computing. A large number of clients or data owners store their data on servers in the cloud and it is provided back to them whenever needed. The data provided should not be jeopardized. Data integrity should be taken into account so that the data is correct, consistent and accessible. For ensuring the integrity in cloud computing environment, cloud storage providers should be trusted. Dealing with single cloud providers is predicted to become less secure with customers due to risks of service availability, failure and the possibility of malicious insiders in the single cloud. This paper deals with multi cloud environments to resolve these issues. The integrity of the data in multi cloud storage has been provided with the help of trusted third party using cryptographic algorithm.
A challenge for security and service level agreement in cloud computingeeSAT Journals
This document discusses challenges related to security and service level agreements in cloud computing. It provides an overview of cloud computing architecture including different types of clouds (public, private, hybrid) and cloud service models (SaaS, PaaS, IaaS). Service level agreements define protocols between cloud service providers and customers regarding service expectations. However, security remains a major challenge as customer data stored in shared cloud environments faces risks like malicious attacks, data isolation issues, and long-term data viability concerns. Ensuring privacy and restricting access to authorized users while isolating customer data are important for addressing security issues in cloud computing.
A challenge for security and service level agreement in cloud computingeeSAT Publishing House
This document discusses security and service level agreements in cloud computing. It begins by defining cloud computing as storing user data virtually over the cloud without infrastructure. Users connect to cloud service providers through the internet based on service level agreements. There are challenges regarding traffic management, security, and privacy in cloud computing. The document then provides an overview of cloud architecture, including public, private and hybrid cloud models. It discusses how service level agreements establish protocols between users and providers. While cloud computing provides benefits, ensuring security remains a key challenge that service level agreements must address.
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...IJERA Editor
Cloud storage systems to protect data from corruptions, redundant data to tolerate failures of storage and lost data should be repaired when storage fails. Regenerating codes provide fault tolerance by striping data across multiple servers, while using less repair traffic than traditional erasure codes during failure recovery. In previous research implemented practical Data Integrity Protection (DIP) scheme for regenerating-coding based cloud storage. Functional Minimum-Storage Regenerating (FMSR) codes and it construct FMSR-DIP codes, which allow clients to remotely verify the integrity of random subsets of long-term archival data under a multi server setting. The problem is to optimize bandwidth consumption when repairing multiple failures. The cooperative repair of multiple failures can help to further save bandwidth consumption when multiple failures are being repaired.
Prediction Based Efficient Resource Provisioning and Its Impact on QoS Parame...IJECEIAES
The purpose of this paper is to provision the on demand resources to the end users as per their need using prediction method in cloud computing environment. The provisioning of virtualized resources to cloud consumers according to their need is a crucial step in the deployment of applications on the cloud. However, the dynamical management of resources for variable workloads remains a challenging problem for cloud providers. This problem can be solved by using a prediction based adaptive resource provisioning mechanism, which can estimate the upcoming resource demands of applications. The present research introduces a prediction based resource provisioning model for the allocation of resources in advance. The proposed approach facilitates the release of unused resources in the pool with quality of service (QoS), which is defined based on prediction model to perform the allocation of resources in advance. In this work, the model is used to determine the future workload prediction for user requests on web servers, and its impact toward achieving efficient resource provisioning in terms of resource exploitation and QoS. The main contribution of this paper is to develop the prediction model for efficient and dynamic resource provisioning to meet the requirements of end users.
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...iosrjce
Cloud computing is an important transition that makes change in service oriented computing
technology. Cloud service provider follows pay-as-you-go pricing approach which means consumer uses as
many resources as he need and billed by the provider based on the resource consumed. CSP give a quality of
service in the form of a service level agreement. For transparent billing, each billing transaction should be
protected against forgery and false modifications. Although CSPs provide service billing records, they cannot
provide trustworthiness. It is due to user or CSP can modify the billing records. In this case even a third party
cannot confirm that the user’s record is correct or CSPs record is correct. To overcome these limitations we
introduced a secure billing system called THEMIS. For secure billing system THEMIS introduces a concept of
cloud notary authority (CNA). CNA generates mutually verifiable binding information that can be used to
resolve future disputes between user and CSP. This project will produce the secure billing through monitoring
the service level agreement (SLA) by using the SMon module. CNA can get a service logs from SMon and stored
it in a local repository for further reference. Even administrator of a cloud system cannot modify or falsify the
data.
This document discusses strategic dimensions for network and IT service providers entering the cloud computing market. It conducted a survey of experts on both the demand and supply sides of the industry. The survey found that cloud computing is seen as a good opportunity for both network and IT service providers to expand into. Experts said the top benefits of cloud computing are flexibility, scalability, cost savings, and business continuity. However, security and data confidentiality were cited as major concerns. The document provides recommendations on strategic positioning in areas like value proposition, branding, and customization to differentiate in the cloud computing market.
Advance Computing Paradigm with the Perspective of Cloud Computing-An Analyti...Eswar Publications
Internet has been a driving force towards the various technologies that have been developed. Arguably, one of the
most discussed among all of these is Cloud Computing. Cloud computing is seen as a trend in the present day scenario with almost all the organizations trying to make an entry into it. It is a promising and emerging technology for the next generation of IT applications. This paper presents the evolution, history, and definition of cloud computing and also presents a comprehensive analysis of the cloud computing by explaining its services and deployment models, and identifying various characteristics of concern.
ADVANCES IN HIGHER EDUCATIONAL RESOURCE SHARING AND CLOUD SERVICES FOR KSAIJCSES Journal
This document summarizes research on cloud computing services and resource sharing for higher education in Saudi Arabia. It discusses several frameworks and tools for evaluating cloud migration options, including decision support systems that allow users to select suitable cloud providers based on their requirements. Case studies on cloud adoption in various fields like healthcare, oil and gas, and education are also reviewed. The document concludes that cloud computing provides opportunities to reduce costs while improving access to resources, but security, reliability and control issues must be considered during migration planning.
Comparison of data security in grid and cloud computingeSAT Journals
Abstract In the current era, Grid computing and cloud computing are the main fields in the research work. This thesis define which are the main security issues to be considered in cloud computing and grid computing, and how some of these security issues are solved. Comparative study shows the grid security is tighter than the cloud. It also shows cloud computing is less secure and faced security problems. This research work is based on main security problems in cloud computing such as authentication, authorization, access control and security infrastructure (SLA). Cloud infrastructure is based on service level agreement; simply cloud providers provide different services to cloud’s users and organizations with an agreement known SLA. So the security and privacy of user’s data is the main problem, because unauthorized person can’t access the data of cloud user. Hacking and data leakage are the common threats in cloud computing. As the security due to hackers increase over internet and the cloud computing is totally on internet. At this time, cloud computing demand the tight password protection and strong authentication and authorization procedure. For an increased level of security, privacy and password protection, we provide a new strong authentication model named “Two factor authentications using graphical password with pass point scheme”. This authentication model includes the login procedure, access control that is based on service level agreement (SLA) in cloud computing. Index Terms: Cloud computing, Authentication, login, Recognition, Recall, Pass point, security, Cloud Provider, Service level Agreement, Two Factor Authentication
MMB Cloud-Tree: Verifiable Cloud Service SelectionIJAEMSJORNAL
In the existing cloud brokerage system, the client does not have the ability to verify the result of the cloud service selection. There are possibilities that the cloud broker can be biased in selecting the best Cloud Service Provider (CSP) for a client. A compromised or dishonest cloud broker can unfairly select a CSP for its own advantage by cooperating with the selected CSP. To address this problem, we propose a mechanism to verify the CSP selection result of the cloud broker. In this verification mechanism, properties of every CSP will also be verified. It uses a trusted third party to gather clustering result from the cloud broker. This trusted third party is also used as a base station to collect CSP properties in a multi-agent’s system. Software Agents are installed and running on every CSP. The CSP is monitored by agents as the representative of the customer inside the cloud. These multi-agents give reports to a third party that must be trusted by CSPs, customers and the Cloud Broker. The third party provides transparency by publishing reports to the authorized parties (CSPs and Customers).
SenseChain: A Blockchain-based Crowdsensing Framework For Multiple Requesters...Maha Kadadha
In this paper, we propose a decentralized crowdsensing framework for multiple requesters with multiple workers built on Ethereum blockchain- SenseChain. Crowdsensing frameworks utilize workers’ sensing capabilities to fulfill requesters’ sensing tasks. While crowdsensing is typically managed by a centralized platform, the centralized management entails various challenges such as reliability in workers’ selection, fair evaluation for payment distribution, potential breach of users’ privacy, and high deployment cost. The proposed solution, SenseChain, is a decentralized crowdsensing framework developed to run on Ethereum blockchain to mitigate said challenges while increasing users’ engagement, with reasonable cost. SenseChain is developed around three smart contracts: 1) User Manager Contract (UMC), 2) Task Manager Contract (TMC), and 3) Task Detailed Contract (TDC). These contracts implement the platform features such as maintaining users’ information, publishing tasks from multiple requesters, accepting reservations and solutions from multiple workers, and evaluating solutions to calculate proportional payments. The framework is implemented using Solidity and Web3.js, where a real publicly available dataset is used. The framework performance is compared to a centralized greedy selection framework to demonstrate its comparability while mitigating tackled challenges. The results in terms of solutions quality, time cost, and workers traveled distance confirm its viability as a solution for crowdsensing.
Link: https://www.researchgate.net/publication/338029700_SenseChain_A_blockchain-based_crowdsensing_framework_for_multiple_requesters_and_multiple_workers
The document compares the security of grid computing and cloud computing. Grid computing is considered more mature and has tighter security than cloud computing. Some key differences are:
- Grid computing uses multiple IDs for authentication while cloud often uses a single ID and password.
- Grid security infrastructure (GSI) uses public key protocols for authentication, communication protection, and authorization. Cloud relies more on basic username and password.
- Grid computing enforces service level agreements (SLAs) and policies across sites using distributed enforcement points. Cloud SLA security is simpler.
- The document proposes a new two-factor authentication model for cloud computing that uses graphical passwords and pass point selection on images for added security.
Design and Implementation of Multibit Flip flops by Using Single Phase Adiaba...IJERA Editor
The document discusses reducing power consumption in VLSI designs by merging single-bit flip-flops into multi-bit flip-flops and using an adiabatic clock. It first identifies mergeable flip-flops using a binary tree structure and builds a combinational table. The flip-flops are then merged according to the table. An adiabatic clock, resembling a sine wave, is added which further reduces power consumption and timing compared to just merging flip-flops. Power and timing calculations show that merging flip-flops reduces power by over 50% and using an adiabatic clock provides an additional 20% reduction in power with faster timing.
All people want to improve their quality of life and this can be achieved only by technology. Many problems are faced by daily vehicle users in payment based parking systems, both in open air parking system where the parking is done along the streets and in closed parking system where parking is done in closed infrastructure added with entry and exit points. Delays (long queues) and accuracy in fares are the main problems faced by the users. Many solutions are proposed to solve this problem but all have their own drawbacks. In this paper a new solution is proposed based on Near Field Communication (NFC) which makes the payment system reliable and easy.
Evolving Swings (topics) from Social Streams using Probability ModelIJERA Editor
This document presents a probability model for detecting evolving topics from social media streams. It focuses on the social aspects of posts reflected in user mentioning behavior, rather than textual content. The model captures the number of mentions per post and frequency of mentioned users. It analyzes individual posting anomalies and aggregates anomaly scores. SDNML change point analysis and burst detection are then used to identify evolving topics from the aggregated scores. Experimental results show that link-based detection using this approach performs better than key-based detection using textual content alone. The model overcomes limitations of prior frequency-based approaches and can detect topics from both textual and non-textual social media posts.
Application of Elastic Layered System in the Design of RoadIJERA Editor
This document discusses the application of elastic layered system theory in road design. It can be used to calculate asphalt pavement thickness, analyze stress in cement concrete pavements, and calculate load stress in porous concrete bases. The elastic layered system assumes layers are made of homogeneous, isotropic materials and loads are applied as uniform circles. It provides a simple model that generally reflects actual stress conditions despite differences from reality. The document provides examples of using the theory to calculate pavement thickness and analyze deflection and stress at different points in the pavement structure.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...IRJET Journal
This document proposes a novel approach for secure group data sharing in cloud computing using a symmetric balanced incomplete block design (SBIBD). The approach aims to enable anonymous yet traceable data sharing among group members in the cloud. It uses the concept of group signature and SBIBD to efficiently generate a common group key for encrypting and decrypting shared data, providing security while supporting group data sharing. The SBIBD and group signature techniques are used to achieve privacy, security, traceability and efficient access control. Experimental results demonstrate the effectiveness of generating the group key and uploading/accessing encrypted files through the group manager. The proposed approach supports dynamic membership changes and is secure and efficient for group data sharing in cloud computing.
IRJET - An Intelligent Recommendation for Social Contextual Image using H...IRJET Journal
This document presents a research paper that proposes a hierarchical attention model called HASC for social contextual image recommendation. It identifies three key aspects (upload history, social influence, owner admiration) that affect users' preferences for images. A hierarchical attention network is designed to model these aspects and their relationships. Experimental results on real-world datasets show the model outperforms baselines in image recommendation. The paper aims to better capture complex user preferences by fusing social network information with image and user data.
Enhancing Data Integrity in Multi Cloud StorageIJERA Editor
Cloud computing is a way to increase the capacity or add capabilities dynamically without investing in new infrastructure, training new personnel, or licensing new software. Cloud is surrounded by many security issues like securing data and examining the utilization of cloud by the cloud computing vendors. Security is one of the major issues which reduce the growth of cloud computing. A large number of clients or data owners store their data on servers in the cloud and it is provided back to them whenever needed. The data provided should not be jeopardized. Data integrity should be taken into account so that the data is correct, consistent and accessible. For ensuring the integrity in cloud computing environment, cloud storage providers should be trusted. Dealing with single cloud providers is predicted to become less secure with customers due to risks of service availability, failure and the possibility of malicious insiders in the single cloud. This paper deals with multi cloud environments to resolve these issues. The integrity of the data in multi cloud storage has been provided with the help of trusted third party using cryptographic algorithm.
A challenge for security and service level agreement in cloud computingeeSAT Journals
This document discusses challenges related to security and service level agreements in cloud computing. It provides an overview of cloud computing architecture including different types of clouds (public, private, hybrid) and cloud service models (SaaS, PaaS, IaaS). Service level agreements define protocols between cloud service providers and customers regarding service expectations. However, security remains a major challenge as customer data stored in shared cloud environments faces risks like malicious attacks, data isolation issues, and long-term data viability concerns. Ensuring privacy and restricting access to authorized users while isolating customer data are important for addressing security issues in cloud computing.
A challenge for security and service level agreement in cloud computingeeSAT Publishing House
This document discusses security and service level agreements in cloud computing. It begins by defining cloud computing as storing user data virtually over the cloud without infrastructure. Users connect to cloud service providers through the internet based on service level agreements. There are challenges regarding traffic management, security, and privacy in cloud computing. The document then provides an overview of cloud architecture, including public, private and hybrid cloud models. It discusses how service level agreements establish protocols between users and providers. While cloud computing provides benefits, ensuring security remains a key challenge that service level agreements must address.
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...IJERA Editor
Cloud storage systems to protect data from corruptions, redundant data to tolerate failures of storage and lost data should be repaired when storage fails. Regenerating codes provide fault tolerance by striping data across multiple servers, while using less repair traffic than traditional erasure codes during failure recovery. In previous research implemented practical Data Integrity Protection (DIP) scheme for regenerating-coding based cloud storage. Functional Minimum-Storage Regenerating (FMSR) codes and it construct FMSR-DIP codes, which allow clients to remotely verify the integrity of random subsets of long-term archival data under a multi server setting. The problem is to optimize bandwidth consumption when repairing multiple failures. The cooperative repair of multiple failures can help to further save bandwidth consumption when multiple failures are being repaired.
Prediction Based Efficient Resource Provisioning and Its Impact on QoS Parame...IJECEIAES
The purpose of this paper is to provision the on demand resources to the end users as per their need using prediction method in cloud computing environment. The provisioning of virtualized resources to cloud consumers according to their need is a crucial step in the deployment of applications on the cloud. However, the dynamical management of resources for variable workloads remains a challenging problem for cloud providers. This problem can be solved by using a prediction based adaptive resource provisioning mechanism, which can estimate the upcoming resource demands of applications. The present research introduces a prediction based resource provisioning model for the allocation of resources in advance. The proposed approach facilitates the release of unused resources in the pool with quality of service (QoS), which is defined based on prediction model to perform the allocation of resources in advance. In this work, the model is used to determine the future workload prediction for user requests on web servers, and its impact toward achieving efficient resource provisioning in terms of resource exploitation and QoS. The main contribution of this paper is to develop the prediction model for efficient and dynamic resource provisioning to meet the requirements of end users.
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...iosrjce
Cloud computing is an important transition that makes change in service oriented computing
technology. Cloud service provider follows pay-as-you-go pricing approach which means consumer uses as
many resources as he need and billed by the provider based on the resource consumed. CSP give a quality of
service in the form of a service level agreement. For transparent billing, each billing transaction should be
protected against forgery and false modifications. Although CSPs provide service billing records, they cannot
provide trustworthiness. It is due to user or CSP can modify the billing records. In this case even a third party
cannot confirm that the user’s record is correct or CSPs record is correct. To overcome these limitations we
introduced a secure billing system called THEMIS. For secure billing system THEMIS introduces a concept of
cloud notary authority (CNA). CNA generates mutually verifiable binding information that can be used to
resolve future disputes between user and CSP. This project will produce the secure billing through monitoring
the service level agreement (SLA) by using the SMon module. CNA can get a service logs from SMon and stored
it in a local repository for further reference. Even administrator of a cloud system cannot modify or falsify the
data.
This document discusses strategic dimensions for network and IT service providers entering the cloud computing market. It conducted a survey of experts on both the demand and supply sides of the industry. The survey found that cloud computing is seen as a good opportunity for both network and IT service providers to expand into. Experts said the top benefits of cloud computing are flexibility, scalability, cost savings, and business continuity. However, security and data confidentiality were cited as major concerns. The document provides recommendations on strategic positioning in areas like value proposition, branding, and customization to differentiate in the cloud computing market.
Advance Computing Paradigm with the Perspective of Cloud Computing-An Analyti...Eswar Publications
Internet has been a driving force towards the various technologies that have been developed. Arguably, one of the
most discussed among all of these is Cloud Computing. Cloud computing is seen as a trend in the present day scenario with almost all the organizations trying to make an entry into it. It is a promising and emerging technology for the next generation of IT applications. This paper presents the evolution, history, and definition of cloud computing and also presents a comprehensive analysis of the cloud computing by explaining its services and deployment models, and identifying various characteristics of concern.
ADVANCES IN HIGHER EDUCATIONAL RESOURCE SHARING AND CLOUD SERVICES FOR KSAIJCSES Journal
This document summarizes research on cloud computing services and resource sharing for higher education in Saudi Arabia. It discusses several frameworks and tools for evaluating cloud migration options, including decision support systems that allow users to select suitable cloud providers based on their requirements. Case studies on cloud adoption in various fields like healthcare, oil and gas, and education are also reviewed. The document concludes that cloud computing provides opportunities to reduce costs while improving access to resources, but security, reliability and control issues must be considered during migration planning.
Comparison of data security in grid and cloud computingeSAT Journals
Abstract In the current era, Grid computing and cloud computing are the main fields in the research work. This thesis define which are the main security issues to be considered in cloud computing and grid computing, and how some of these security issues are solved. Comparative study shows the grid security is tighter than the cloud. It also shows cloud computing is less secure and faced security problems. This research work is based on main security problems in cloud computing such as authentication, authorization, access control and security infrastructure (SLA). Cloud infrastructure is based on service level agreement; simply cloud providers provide different services to cloud’s users and organizations with an agreement known SLA. So the security and privacy of user’s data is the main problem, because unauthorized person can’t access the data of cloud user. Hacking and data leakage are the common threats in cloud computing. As the security due to hackers increase over internet and the cloud computing is totally on internet. At this time, cloud computing demand the tight password protection and strong authentication and authorization procedure. For an increased level of security, privacy and password protection, we provide a new strong authentication model named “Two factor authentications using graphical password with pass point scheme”. This authentication model includes the login procedure, access control that is based on service level agreement (SLA) in cloud computing. Index Terms: Cloud computing, Authentication, login, Recognition, Recall, Pass point, security, Cloud Provider, Service level Agreement, Two Factor Authentication
MMB Cloud-Tree: Verifiable Cloud Service SelectionIJAEMSJORNAL
In the existing cloud brokerage system, the client does not have the ability to verify the result of the cloud service selection. There are possibilities that the cloud broker can be biased in selecting the best Cloud Service Provider (CSP) for a client. A compromised or dishonest cloud broker can unfairly select a CSP for its own advantage by cooperating with the selected CSP. To address this problem, we propose a mechanism to verify the CSP selection result of the cloud broker. In this verification mechanism, properties of every CSP will also be verified. It uses a trusted third party to gather clustering result from the cloud broker. This trusted third party is also used as a base station to collect CSP properties in a multi-agent’s system. Software Agents are installed and running on every CSP. The CSP is monitored by agents as the representative of the customer inside the cloud. These multi-agents give reports to a third party that must be trusted by CSPs, customers and the Cloud Broker. The third party provides transparency by publishing reports to the authorized parties (CSPs and Customers).
SenseChain: A Blockchain-based Crowdsensing Framework For Multiple Requesters...Maha Kadadha
In this paper, we propose a decentralized crowdsensing framework for multiple requesters with multiple workers built on Ethereum blockchain- SenseChain. Crowdsensing frameworks utilize workers’ sensing capabilities to fulfill requesters’ sensing tasks. While crowdsensing is typically managed by a centralized platform, the centralized management entails various challenges such as reliability in workers’ selection, fair evaluation for payment distribution, potential breach of users’ privacy, and high deployment cost. The proposed solution, SenseChain, is a decentralized crowdsensing framework developed to run on Ethereum blockchain to mitigate said challenges while increasing users’ engagement, with reasonable cost. SenseChain is developed around three smart contracts: 1) User Manager Contract (UMC), 2) Task Manager Contract (TMC), and 3) Task Detailed Contract (TDC). These contracts implement the platform features such as maintaining users’ information, publishing tasks from multiple requesters, accepting reservations and solutions from multiple workers, and evaluating solutions to calculate proportional payments. The framework is implemented using Solidity and Web3.js, where a real publicly available dataset is used. The framework performance is compared to a centralized greedy selection framework to demonstrate its comparability while mitigating tackled challenges. The results in terms of solutions quality, time cost, and workers traveled distance confirm its viability as a solution for crowdsensing.
Link: https://www.researchgate.net/publication/338029700_SenseChain_A_blockchain-based_crowdsensing_framework_for_multiple_requesters_and_multiple_workers
The document compares the security of grid computing and cloud computing. Grid computing is considered more mature and has tighter security than cloud computing. Some key differences are:
- Grid computing uses multiple IDs for authentication while cloud often uses a single ID and password.
- Grid security infrastructure (GSI) uses public key protocols for authentication, communication protection, and authorization. Cloud relies more on basic username and password.
- Grid computing enforces service level agreements (SLAs) and policies across sites using distributed enforcement points. Cloud SLA security is simpler.
- The document proposes a new two-factor authentication model for cloud computing that uses graphical passwords and pass point selection on images for added security.
Design and Implementation of Multibit Flip flops by Using Single Phase Adiaba...IJERA Editor
The document discusses reducing power consumption in VLSI designs by merging single-bit flip-flops into multi-bit flip-flops and using an adiabatic clock. It first identifies mergeable flip-flops using a binary tree structure and builds a combinational table. The flip-flops are then merged according to the table. An adiabatic clock, resembling a sine wave, is added which further reduces power consumption and timing compared to just merging flip-flops. Power and timing calculations show that merging flip-flops reduces power by over 50% and using an adiabatic clock provides an additional 20% reduction in power with faster timing.
All people want to improve their quality of life and this can be achieved only by technology. Many problems are faced by daily vehicle users in payment based parking systems, both in open air parking system where the parking is done along the streets and in closed parking system where parking is done in closed infrastructure added with entry and exit points. Delays (long queues) and accuracy in fares are the main problems faced by the users. Many solutions are proposed to solve this problem but all have their own drawbacks. In this paper a new solution is proposed based on Near Field Communication (NFC) which makes the payment system reliable and easy.
Evolving Swings (topics) from Social Streams using Probability ModelIJERA Editor
This document presents a probability model for detecting evolving topics from social media streams. It focuses on the social aspects of posts reflected in user mentioning behavior, rather than textual content. The model captures the number of mentions per post and frequency of mentioned users. It analyzes individual posting anomalies and aggregates anomaly scores. SDNML change point analysis and burst detection are then used to identify evolving topics from the aggregated scores. Experimental results show that link-based detection using this approach performs better than key-based detection using textual content alone. The model overcomes limitations of prior frequency-based approaches and can detect topics from both textual and non-textual social media posts.
Application of Elastic Layered System in the Design of RoadIJERA Editor
This document discusses the application of elastic layered system theory in road design. It can be used to calculate asphalt pavement thickness, analyze stress in cement concrete pavements, and calculate load stress in porous concrete bases. The elastic layered system assumes layers are made of homogeneous, isotropic materials and loads are applied as uniform circles. It provides a simple model that generally reflects actual stress conditions despite differences from reality. The document provides examples of using the theory to calculate pavement thickness and analyze deflection and stress at different points in the pavement structure.
Electroelastic Response of a Piezoelectric Semi-infinite Body with D∞ Symmetr...IJERA Editor
In this paper, with the aim of developing a nondestructive evaluation technique using piezoelectric signals in
wooden materials, we theoretically study the electroelastic field in a semi-infinite body with D∞ symmetry
subjected to surface friction parallel to the ∞-fold rotation axis. By applying the analytical technique previously
proposed by us, we formulate expressions for electroelastic field quantities, including electric potential, electric
field, electric displacement, elastic displacement, strain, and stress by using two “elastic displacement potential
functions” and two “piezoelastic displacement potential functions.” These potential functions and, consequently,
the electroelastic field quantities are formulated using Fourier transforms in order to satisfy electroelastic
boundary conditions. We carried out numerical calculations to correctly evaluate field quantities inside the body
and at its surface. As a result, we were successful in quantitatively elucidating the surface electric displacement
in response to the elastic stimulus of surface friction and suggested the possibility of a nondestructive evaluation
technique using piezoelectric signals.
This document summarizes a study on using liquid desiccants to improve energy efficiency in air conditioning. It discusses how liquid desiccants can remove moisture from air more efficiently than vapor compression alone, avoiding the need for overcooling and reheating. The document describes low-flow liquid desiccant air conditioning technology, how it works in a conditioner and regenerator, and its potential benefits, such as reduced energy consumption and improved indoor air quality. Key findings include that mass transfer coefficients and energy savings increase significantly with higher humidity ratios, while Lewis numbers decrease more slowly with increased desiccant concentration.
Synthesis of Calcium Silicate (Casio3) Using Calcium Fluoride, Quartz and Mic...IJERA Editor
Microbes like bacteria, algae, fungi and virus play an important role to catalyst chemical reactions. In Nature,
ores or minerals of different compounds are formed due to microbial environment and other factors like
weathering. Microbial environment is also instrumental in forming calcium containing silicate minerals.
Chemical reactions occur under microbial environment because microbes have the ability to control or modify
different factors like pH, chemical potential and temperature during reactions. In this paper, synthesis of calcium
silicate (CaSiO3) using calcium fluoride (CaF2) and quartz (SiO2) under microbial environment in a laboratory is
being adopted to produce the required material. XRD technique is used to confirm the formation of CaSiO3.
Statistical Optimization of process parameters for SiO2-Nickel nanocomposites...IJERA Editor
The optimum combination of process parameters - temperature, time of reduction under nitrogen atmosphere and amount of NiCl2 was delineated to find the maximum yield of nanocrystallite Ni in the synthesized silica gel matrix. A statistically adequate regression equation, within 95% confidence limit was developed by carrying out a set of experiments within the framework of design of experiment. The regression equation is found to indicate the beneficial role of the temperature and time of reduction.
Preparation and Characterization of Lithium Ion Conducting Solid Polymer Elec...IJERA Editor
Solid Polymer electrolyte films have been prepared from Starch-Poly vinyl alcohol (PVA) blend a well acknowledged biodegradable material. Solution cast technique was employed for the preparation of solid polymer electrolyte films added with Lithium Bromide (LiBr) salt. X-ray diffraction (XRD) studies of the prepared films portrayed the evolution of an amorphous structure with increasing content of salt which is an important factor that leads to the augmentation of conductivity. Electrochemical impedance spectroscopic analysis revealed noticeable ionic conductivity ~ 5x 10-3 S/cm for 20 wt% of salt at ambient conditions. Ionic conductivity showed an increasing trend with salt content at ambient conditions. Transference number measurements confirmed the ionic nature of the prepared solid polymer electrolyte films. Dielectric studies revealed a sharp increase in the number of charge carriers which contributed to enhancement in conductivity. Low values of activation energy extracted from temperature dependent conductivity measurements could be favorable for device applications. For the composition with highest conductivity a temperature independent relaxation mechanism was confirmed by electric modulus scaling.
Parametric Study of Multi-Spot Welded Lap Shear Specimen for Shear StrengthIJERA Editor
The effect of number of spots, spot spacing, squeezing force, welding current, weld time , overlapping length
and sheet thicknesson the shear strength of two similar galvanized steel sheets are investigated through
experiments using RSM method. Similar sheets of galvanized steel sheets are made by resistance spot welding
at different processing conditions and these joint populations were tested under lap-shear loading conditions.
Specially fabricated fixture is used to load the lap shear specimen in the universal testing machine Regression
analysis is done to obtain relationship between shear strength and selected parameters. The experimental results
indicate that the failure loads of spot welds in lap-shear specimens increase when number of spot, squeezing
force, welding current and sheet thickness increase for the given ranges.
Image Restoration UsingNonlocally Centralized Sparse Representation and histo...IJERA Editor
Due to the degradation of observed image the noisy, blurred, distorted image can be occurred .To restore the image informationby conventional modelsmay not be accurate enough for faithful reconstruction of the original image. I propose the sparse representations to improve the performance of based image restoration. In this method the sparse coding noise is added for image restoration, due to this image restoration the sparse coefficients of original image can be detected. The so-called nonlocally centralized sparse representation (NCSR) model is as simple as the standard sparse representation model, fordenoising the image here we use the histogram clipping method by using histogram based sparse representation to effectively reduce the noise and also implement the TMR filter for Quality image. Various types of image restoration problems, including denoising, deblurring and super-resolution, validate the generality and state-of-the-art performance of the proposed algorithm.
Optimization of Metal Removal Rateon Cylindrical Grinding For Is 319 Brass Us...IJERA Editor
Cylindrical grinding is one of the most important metal cutting processes used extensively in the Metal finishing operations. Metal removal rate and surface finish are the important output responses in the production with respect to quantity and quality respectively. The objective of this paper is to arrive at the optimal grinding conditions that will maximize metal removal rate when grinding IS 319 brass. Empirical models were developed using design of experiments by Taguchi L9 Orthogonal Array and the adequacy of the developed model is tested with ANOVA.
Dual-Level Adaptive Supply Voltage System with Bandgap Reference MPR for Vari...IJERA Editor
Nowadays VLSI circuits have become much advanced by overcoming many challenges such as extra power
consumption, but circuit aging along with process variations are still challenging the advancements in power
efficient VLSI circuits. The aim of this dissertation is to propose the new adaptive technique to efficiently
compensate the fine grained variations by addressing the limitations in existing adaption approach. Adaptive
supply voltage (ASV) is proved to be one among the top most adaptation approaches in tuning of power
performance. Controlling power leakage is the main advantage in using ASV, while delivery overheads along
with voltage generation from conventional ASV systems make their application to mitigate fine-grained
variations demanding. The main aim of this dissertation is to present a dual level ASV system with band gap
reference Miniature programmable regulator (BGRMPR). Reference voltage independent of process and
temperature variations can be achieved because of using band gap reference voltage. Another advantage of
adapting this approach is because less power is consumed by system when compared to dual-level ASV system
with MPR.
Characteristics and Utilization Principle of Native Plants in HighwayIJERA Editor
Highway greening projects, in essence, is a kind of ecological restoration project. Plant as the prerequisite and
important material basis of ecological restoration, the choice and utilization of plant is the key to the success of
green. In the current green design, this part also has many problems. Therefore, this paper puts forward the
definition of native plants in ecological theory, and summarizes the characteristics and the use of different types of
plants.
Structural Vibration Control Using Solid Particle DamperIJERA Editor
1) The document experimentally investigates the effectiveness of a solid particle damper for controlling structural vibrations. Shake table tests were performed on a 2-story steel frame with and without a particle damper.
2) Results show that particle dampers can effectively control the fundamental mode of vibration. Damping performance depends on parameters like particle size, shape, material, and number of layers - smaller, irregular particles and more layers provide more damping.
3) Tests using different particle materials found that non-metallic particles also provide damping. Maximum energy dissipation occurred with marble beads.
4) Comparison with a friction damper showed the particle damper dissipated 31.8% more energy, demonstrating its greater
Geo Environmental Investigation of Abuad Dumpsite, Southwestern NigeriaIJERA Editor
Geoenvironmental study of ABUAD female dumpsite was conducted to investigate the suitability of its location
and potential impact on groundwater in the environment. Profiling and Vertical electrical sounding methods
were employed using Dipole - Dipole and Schlumberger configuration respectively. Five points were sounded
and one profile was occupied. Three heterogeneous subsurface lithologic units were established namely; lateritic
topsoil, clayey-sand, and, fresh basement. The curve types are simple H and HA. The topsoil and clayey-sand
materials are characterized with relatively low resistivity values while the fresh basement materials are
characterized with high resistivity values. The average resistivity and thickness values for the topsoil are
280.0Ωm and.2.3m respectively. Clayey-sand was encountered in all the locations with average resistivity and
thickness values of 32.0Ωm and 7.3m respectively. Basement is relatively shallow in the study area, it was
encountered in all the locations with an average resistivity and depth values to the top of basement of 674Ωm,
and 9.6m respectively. Overburden materials are relatively thin within the area with an average resistivity and
thickness values of 156Ωm, and 9.6m respectively. The overburden materials constituting the aquiferous units
within the study area are porous, vulnerable, and good paths for leachate migration. The relatively low
resistivity values within the clayey-sand layers (14 - 61Ωm) are suggestive of leachate intrusion, while relatively
high resistivity values of the impervious basement are due to their crystalline nature. The proximity of the
dumpsite to both the cafeteria and residential halls is a cause for concern.
A Combination of Wavelet Artificial Neural Networks Integrated with Bootstrap...IJERA Editor
In this paper, an iterative forecasting methodology for time series prediction that integrates wavelet de-noising
and decomposition with an Artificial Neural Network (ANN) and Bootstrap methods is put forward here.
Basically, a given time series to be forecasted is initially decomposed into trend and noise (wavelet) components
by using a wavelet de-noising algorithm. Both trend and noise components are then further decomposed by
means of a wavelet decomposition method producing orthonormal Wavelet Components (WCs) for each one.
Each WC is separately modelled through an ANN in order to provide both in-sample and out-of-sample
forecasts. At each time t, the respective forecasts of the WCs of the trend and noise components are simply
added to produce the in-sample and out-of-sample forecasts of the underlying time series. Finally, out-of-sample
predictive densities are empirically simulated by the Bootstrap sampler and the confidence intervals are then
yielded, considering some level of credibility. The proposed methodology, when applied to the well-known
Canadian lynx data that exhibit non-linearity and non-Gaussian properties, has outperformed other methods
traditionally used to forecast it.
Collapse Behaviour and Energy Absorption of Aluminium Tubes Filled with Wood ...IJERA Editor
Experiments on filled and empty circular thin walled Aluminium AA6063 tubes with varying L/D ratios have
been performed to study load compression and energy absorbed for quasi static axial and oblique loading.
Dependence of deformation characteristics and energy absorption responses have been studied. Energy
absorption was measured from load-displacement graph obtained from UTM using MATLAB. Tubes were
clamped at the lower end and axial and oblique loads were applied by applying a force at upper end with
different angles to the centreline of column. Peak loads and absorbed energies have been compared for filled
and empty tubes for same L/D ratio. Experimental results are used to determine energy absorption capacity due
to plastic deformation of thin walled tube. The goal of the research was to study the interaction between the
forming and crash response of Al AA6063 in order to evaluate its potential for use in vehicle design for
crashworthiness.
A Mathematical Model to Solve Nonlinear Initial and Boundary Value Problems b...IJERA Editor
In this paper, a novel method called Laplace-differential transform method (LDTM) is used to obtain an
approximate analytical solution for strong nonlinear initial and boundary value problems associated in
engineering phenomena. It is determined that the method works very well for the wide range of parameters and
an excellent agreement is demonstrated and discussed between the approximate solution and the exact one in
three examples. The most significant features of this method are its capability of handling non-linear boundary
value problems.
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...IJERA Editor
Cloud computing, undoubtedly, is a path to expand the limits or add powerful capabilities on-demand with
almost no investment in new framework, training new staff, or authorizing new software. Though today
everyone is talking about cloud but, organizations are still in dilemma whether it’s safe to deploy their business
on cloud. The reason behind it; is nothing but Security. No cloud service provider provides 100% security
assurance to its customers and therefore, businesses are hesitant to accept cloud and the vast benefits that come
along with it. The absence of proper security controls delimits the benefits of cloud. In this paper, a review on
different cloud service models and a survey of the different security challenges and issues while providing
services in cloud is presented .The paper focuses on the security issues specific to service delivery model (SaaS,
IaaS and PaaS) of cloud environment. This paper also explores the various security solutions currently being
applied to protect cloud from various kinds of intruders.
Cloud Armor: An Overview of Trusty Supporting Reputation based Management for...IRJET Journal
This document proposes a reputation-based trust management framework called CloudArmor to address trust issues in cloud computing. It describes three key challenges of trust management in clouds: 1) preserving privacy of sensitive user information, 2) protecting cloud services from malicious users providing misleading feedback, and 3) guaranteeing availability of trust management services given the dynamic cloud environment. The proposed framework includes a protocol to verify credibility of feedback while preserving privacy, an adaptive credibility model to measure feedback credibility and identify malicious users, and an availability model to manage availability of the decentralized trust management service.
Cloud computing technology security and trust challengesijsptm
A let of exclusive features such as high functionality and low cost have made cloud computing a valuable
technology. These remarkable features give users and companies, countless opportunities to reach their
goals spending minimum cost and time. Looking at the literature of this technology, it can be claimed that
the main concerns of the users of cloud are security issues especially trust. Unfortunately these concerns
have not been tackled yet. Therefore we decided to introduce a useful and functioned way to create more
trust among consumers to use this technology .In this paper we suggest the foundation of an international
certification institute for the service providing companies in order to increase trust and enhance likeliness
of using this new and valuable technology among people. Practicality of the technology will improve it and
will make its security better by providers.
This document outlines a final year project proposal on security in cloud computing. The aim is to propose a new trust model between cloud providers and users based on the user's past experience, knowledge of cloud concepts, and security measures at different levels. The document reviews existing literature on reputation-based trust models and encryption techniques. It then discusses research problems around data security, privacy, and trust. The proposed methodology involves surveys to understand user requirements, and experiments using data coloring and watermarking techniques with encryption to securely store fragmented data in the cloud. Potential outcomes include improved service level agreements and fine-grained access control, with limitations around specific data types and formats supported.
This document summarizes a research paper that assesses collaboration frameworks in multi-cloud environments. It explores the viability of cloud service providers collaborating to offer diverse services without heavy infrastructure spending. The paper reviews several proposed collaboration models and frameworks, including a proxy-based framework using different types of proxies, a unified multi-cloud infrastructure using open service models and configurable federations, and a proxy-as-cloud-broker model using dynamic scheduling algorithms. The paper concludes that multi-cloud environments can eliminate vendor lock-in for consumers and allow services to be accessed based on preference and need rather than a single provider. Key challenges to collaboration include standardization and security across provider platforms and services.
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...IJERA Editor
Cloud Computing creates a dynamic resource sharing platform. Using cloud technologies such as virtualization, data can be provided to the active users who are at high need to utilize the resources provided within the cloud. As this data (or service) is stored (or offered) outside the data owner's boundaries, they are skeptical for utilizing cloud technology in order to store or utilize their data or service. There are many issues for these active clients (companies or individuals) to be petrified at the thought of using cloud computing paradigm. Some of the main issues that make the clients not to choose cloud computing may be determined because of three important security aspects such as confidentiality, integrity, and availability. This research focused on the security models that relate confidentiality issues. A literature Review is performed for analyzing the existing confidentiality frameworks and security models in the area of grid computing, cluster computing and virtualization. A new theoretical framework is then designed to overcome confidentiality issues thereby improving the client‟sgeneric understanding of cloud computing services. The resulting framework when implemented in real world would motivate clients to transform their businesses on to cloud.
Abstract Beauty of Cloud Computing is its Simplicity. A lot of visions exist for Cloud computing terminology. Here is a re-collection of facts about cloud computing. Basic approach for understanding CC technology Interview of cloud technology as well as proposal for further empirical work in modeling cloud computing technologies Index Terms: Parameters; Models; Privacy; Maintenance; Protected cloud
Cloud service ranking with an integration of k-means algorithm and decision-m...IJECEIAES
The present research focuses on ranking cloud services by using the k-means algorithm with multi-criteria decision-making (MCDM) approaches that are the prime factor in the decision-making process and have been used to choose cloud services. The tools offered by MCDM can solve almost any decision-making problem. When faced with a selection challenge in the cloud environment, the trusted party would need to weigh the client’s choice against a predetermined list of criteria. There is a wide range of approaches to evaluating the quality of cloud services. The deep learning model has been considered a branch of artificial intelligence that assesses datasets to perform training and testing and makes decisions accordingly. This paper presents a concise overview of MCDM approaches and discusses some of the most commonly used MCDM methods. Also, a model based on deep learning with the k-means algorithm based decision-making trial and evaluation laboratory (kDE-MATEL) and analytic network process (ANP) is proposed as k-means algorithm based decision-making trial and evaluation laboratory with analytic network process (kD-ANP) for selecting cloud services. The proposed model uses the k-means algorithm and gives different levels of priority and weight to a set of criteria. A traditional model is also compared with a proposed model to reflect the efficiency of the proposed approach.
A CLOUD BROKER APPROACH WITH QOS ATTENDANCE AND SOA FOR HYBRID CLOUD COMPUTIN...cscpconf
Cloud Computing is the industry whose demand has been growing continuously since its appearance as a solution that offers different types of computing resources as a service over the Internet. The number of cloud computing providers grows into a run, while the end user is currently in the position of having many pricing options, distinct features and performance for the same required service. This work is inserted in the cloud computing task scheduling research field to hybrid cloud environments with service-oriented architecture (SOA), dynamic allocation and control of services and QoS requirements attendance. Therefore, it is proposed the QBroker Architecture, representing a cloud broker with trading features that implement the intermediation services, defined by the NIST Cloud Computing Reference Model. An experimental design was created in order to demonstrate compliance to the QoS requirement of maximum task execution time, the differentiation of services and dynamic allocation of services. The experimental results obtained by simulation with CloudSim prove that QBroker has the necessary requirements to provide QoS improvement in hybrid cloud computing environments based on SOA.
An Analysis of the Existing Frameworks in Cloud Computing Adoption and Introd...IJERA Editor
This document proposes a new framework called RAF (Risk Assessment Framework) for evaluating cloud computing adoption projects. It summarizes existing frameworks and identifies their limitations, such as a lack of guidance on key adoption challenges. The proposed RAF framework assesses projects based on a 5-phase roadmap for adoption: analysis, planning, adoption, migration, and management. It provides a set of questions for each phase and weights the questions based on perceived impact to determine how closely a project followed best practices. The RAF aims to minimize risks and increase the success of cloud adoption projects.
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGijsptm
In the digital world using technology and new technologies require safe and reliable environment, and it also requires consideration to all the challenges that technology faces with them and address these challenges. Cloud computing is also one of the new technologies in the IT world in this rule there is no exception. According to studies one of the major challenges of this technology is the security and safety required for providing services and build trust in consumers to transfer their data into the cloud. In this paper we attempt to review and highlight security challenges, particularly the security of data storage in a cloud environment. Also, provides some offers to enhance the security of data storage in the cloud
computing systems that by using these opinions can be overcome somewhat on the problems.
Cloud Armor: A Conclusion Work on Trust Management SystemIJAEMSJORNAL
Distributed computing gives Software as service (Saas) ,Platform as service(Paas) and Infrasrtucture as a service(Iaas).Cloud figuring condition having a few issues like protection and security. Trust administration is a standout amongst the most difficult issue. Shielding a specific cloud benefit from a few assaults like agreement attack(Such as client may give misdirecting criticism about specific cloud services)and Sybil attack(such as a solitary client can make numerous accounts..i.,e noxious user).In this paper we talk about cloudarmor that gives notoriety based trust administration to cloud administrations. A notoriety based trust administration system gives set of functionalities to convey Trust as a service(Taas) . Taas incorporates i)Zeroknowledge believability evidence convention to demonstrate validity of the consumers criticism and jam client security, ii)a validity show it will measures te validity of input to shield cloud administrations from malevolent client. what's more, iii)an accessibility model to deal with the accessibility of the trust administration.
360º Degree Requirement Elicitation Framework for Cloud Service ProvidersIJERA Editor
Thisstudy addresses the factors responsible for cloud computing adoption in implementing cloud computing for any organization. Service Level Agreements play a major role for cloud consumer as well as for cloud provider. SLA depends on the requirements gathered by the cloud providers and they vary with the type of organizations for which process is being performed such as education, retail, IT industry etc. SLAs for cloud computing involves technical as well as business requirements which makes the gathering of requirements from stakeholders point of view the heterogeneous process. This research work proposes a 360 degree requirement gathering framework, which reduces the complexitiesduring the process of requirement gathering by cloud service providersas well as SLAs more reliant.
IRJET- Determination of Multifaceted Trusted Cloud Service using Conventional...IRJET Journal
1. The document proposes a method for determining trusted cloud services using a conventional cloud-based algorithm. It aims to address the issue of selecting trusted cloud services based on user preferences and quality of service attributes.
2. The method involves constructing a multi-granularity standard of trust levels based on Gaussian cloud transformation and developing a computational model of user preferences using cloud analytic hierarchy process.
3. A two-step fuzzy comprehensive evaluation algorithm is then proposed to evaluate and rank different cloud services based on trust scores, providing users with an effective way to select trusted cloud services.
The document discusses a study that aimed to evaluate the transparency of cloud providers' security, privacy, auditability, and service level agreements. It developed a Cloud Provider Transparency Scorecard to assess information from cloud providers' websites. It conducted a preassessment of six cloud providers to evaluate available information and then performed a detailed assessment using the scorecard. The assessment focused on policies, procedures, certifications, audits and service level agreements published on providers' websites.
This document discusses security challenges in cloud computing and proposes a framework to address them. It begins by reviewing existing literature on cloud security that identifies threats like VM-level attacks, management interface compromise, and compliance risks. It then discusses specific threats to cloud computing like changes to business models, abusive use of cloud resources, insecure APIs, and issues from shared infrastructure and multitenancy. The document proposes a cloud security model and framework to define security challenges and help providers enforce complex security policies to detect and prevent attacks in cloud environments.
This document provides a risk assessment report on cloud computing. It begins with an abstract discussing how cloud computing has increased risks that consumers should be aware of. It then presents an introduction on cloud computing and the need for risk assessment. Several existing risk assessment approaches are studied. The discussion section analyzes previous risk assessment methods. It finds that while approaches assess risks for consumers, a complete qualitative or quantitative risk assessment method is still needed. The conclusion is that trust between consumers and providers requires a structured risk assessment approach that covers all domains.
A Modified Things Role Based Access Control Model For Securing Utilities In C...James Heller
This document proposes a modified role-based access control (RBAC) model called Things RBAC (T-RBAC) to improve security in cloud computing environments. T-RBAC extends traditional RBAC to also consider "things" or networked objects in an internet of things. In T-RBAC, object owners are alerted before permissions are granted to access or modify an object. The document reviews challenges of cloud computing, common security issues, and existing access control models like discretionary access control and mandatory access control. It then discusses RBAC in more detail and proposes the modified T-RBAC model to address cloud computing security needs.
Similar to Cloud Trust Management Framework Based On Cloud Market spaces (20)
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Cloud Trust Management Framework Based On Cloud Market spaces
1. W.P. E. Priyadarshani et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 6, ( Part -3) June 2015, pp.129-135
www.ijera.com 129|P a g e
Cloud Trust Management Framework Based On Cloud Market
spaces
W.P. Eureka Priyadarshani1
, Gihan N. Wikramanayake2
, Andrei
Kelarev3
and E.M. Piyal Ekanayake4
1,4
Wayamba University of Sri Lanka, Sri Lanka
2
University of Colombo School of Computing, Sri Lanka
3
Deakin University, Australia
Abstract
Nowadays, applications running in virtual or cloud-based environments are all susceptible to exploitation. However,
traditional trust solutions have not been fully optimized for virtualized third party environments. In this situation, the
selection of an appropriate cloud service provider is an issue. This paper introduces a completely novel idea on most
appropriate cloud service selection through an intermediator. It is based on the new notion of a marketspace. Our paper is
devoted to the investigation of a novel architecture suggested for a marketspace. Several theoretical notions related to trust
have also been explained extensively in the paper for Cloud service provider selection.
Keywords:Trust, Cloud Service Provider, Cloud Marketplace, Cloud Marketspace.
I. Introduction
The selection of the most appropriate and trusted
cloud market is a challenge for the user ([1];[2]). The
most common type of cloud market, referred to as a
cloud marketplace, offers its own services directly to
customers. In general, a cloud marketplace consists
of a particular Cloud Service Provider (CSP), various
types of online services, customers, and, in some
situations, third party service providers who try to
sell their products through the main CSP.
In a cloud marketplace, a user can select a service or
a software application most appropriate to his needs;
user requirements can vary with the size of data to be
stored, the kind and amount of computation to be
performed on data, the level of confidentiality of the
data to be maintained and so on. While some users
prefer cost effectiveness ([3]; [4]) others are more
concerned about data confidentiality [1]. Some cloud
marketplaces, for example, spotcloud (SpotCloudTM,
http://spotcloud.com/) and CloudCommons
(http://www.cloudcommons.com/), even allow users
to select a cloud service provider based on cost,
quality, location and user ratings.
In relation to assisting a user in the selection of the
most appropriate CSP according to user requirements,
Pennington states: “Marketing research has provided
some empirical evidence of the importance of trust
perceptions in market relationships” [5]. The
importance of trust and reputation system in
selecting a trustworthy service provider in cloud
marketplaces is also mentioned by Habib et al. [6]
where the authors conclude: “it is extremely difficult
for cloud consumers to identify trustworthy (or
dependable) cloud providers in these marketplaces”.
The importance of an independent third party
assurance body to accredit the trust of a CSP is
explained in [7]. This discussion around trust
motivates us to develop a deeper understanding of
how cloud markets can be assessed in helping the
user to determine the most trustworthy CSP for her
needs.
The objectives of this paper are focused on the
followings:
- Defining the new concept of a “cloud
marketspace”.
- Introducing an architecture for a cloud
marketspace and its utilization in determining
the most trustworthy cloud service provider.
Sections 2 and 3 provide a review of existing
organization and architectures which are used to find
solutions for trust related issues in cloud service and
cloud markets in selecting a CSP.
RESEARCH ARTICLE OPEN ACCESS
2. International Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 6, ( Part -3) June 2015, pp.00-00
www.ijera.com
130|P a g e
II. Literature Review
As our thorough search of literature has shown,
there is a lack of research on this kind of new
marketing strategy, what we call a cloud
marketspace. As similar idea has been expressed by
Rayport and Sviokla for online markets but not for
cloud markets [8]. Their definition can be
comprehensively taken to define a bi-directional
cloud market as cloud computing is merely an online
service. Further, the term marketspace has been used
in different subject areas in different ways using its
basic structure. For example, Duin has used this for
“learning marketspace” to explain a space where
learners, employers and learning providers meet
together [9]. A comparison between this learning
marketspace and our proposed cloud marketspace is
explained in section 4.1.
Cloud Security Alliance is the first nonprofit
organization formed by professionals of “industry
practitioners, corporations, associations and other
key stakeholders” [10]. It provides security, trust and
assurance within cloud computing.
Considering trust as an important part of cloud
marketspaces [6] our research is focused on issues,
which the CSA tries to solve, and those which
remain unresolved. In this paper, we first focus on
aims and methodology of the CSA and associated
trust management issues. Thereafter we shall explain
how Habib's architecture [6] connects with CSA.
These explanations are intended to help the readers
to understand all aspects of the new concept “cloud
marketspace”.
In 2009, a trust management group calling itself the
Cloud Security Alliance ([10]; [11])was established.
Its mission statement was “To promote the use of
best practices for providing security assurance within
cloud computing, and educate the use of cloud
computing to help secure all other forms of
computing”. One of the mechanisms introduced by
them to determine the industry’s perspective on
security and trust was a questionnaire (CAIQ) for the
users to help them develop a “best practice” model
based on these features. The CSA security matters to
create trust in customers’ opinions in three ways:
a) Creating one standard cloud-specific definition
for “secure”,
b) Streamlining the process for evaluating
providers, and
c) Overcoming security fears to cloud adoption.
All these issues are addressed in their “cloud security
certification” [12].
Further, the CSA provides great support to the
International Standardization Council (ISC) in all
standards-related activities. At the end of 2011, CSA
launched the STAR which stands for Security, Trust
& Assurance Registry. This registry improves
transparency and assurance in the cloud and is
accessible to the general public, thereby helping
users assess the security of cloud providers. In March
of 2014, a new version of Cloud Control Matrix
(CCM v3) was introduced to the cloud market and
from March 2015 onwards, all customers will be
audited against this Matrix.
The Open Certification Framework Working Group
of CSA STAR has defined a multilayered structure
(Figure 1) to encourage providers to make security
capabilities according to the customer’s level of
trust, security and assurance requirements. The
multilayers [10] defined by CSA STAR can be easily
activated in our proposed cloud marketspace as each
layer of their structure demands the level of trust.
STAR Entry - Self Assessment: The bottom
level represents non-critical application users in
the cloud and they might be satisfied with the
results of a provider self-assessment. Publication
of the results of a due diligence self-assessment
based on CSA Consensus Assessment Initiative
(CAI)Questionnaire and/or Cloud Control
Matrix (CCM).
STAR Certification / Attestation: The middle
level represents a complex cloud environment
and the assessment is executed by a qualified
and independent third party. Publication of
available results of a third party assessment
based on CCM and ISO27001 or AICPA
SOC2.
STAR Continuous: At the top level more
advanced assessment based on a continuous
verification of some key parameters and
SLAs are taken into account. Publication of
results of security properties monitoring,
based on Cloud Trust Protocol (CTP) CSA
STAR is capable of assuring trust in three
layers.
Our proposed cloud marketspace (Section 4)
operates on this multi-layered structure according to
the user’s desired levels of trust. Meanwhile, in the
next section, a detailed review on Habib et al. [6]
trust management architecture is presented to
identify the trust issues which remain to be solved.
Fig 1: Multi-Layered Structure as Defined by CSA STAR
3. International Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 6, ( Part -3) June 2015, pp.00-00
www.ijera.com 131|P a g e
Habib and his research group highlight the need to
establish trust for selecting trustworthy service
providers in cloud environments in most of their
publications from 2010. In 2010 [13] they
extensively explained trust and reputation-based
approaches for supporting customers to select service
providers in the cloud market. They explored a
number of parameters such as “(i) Service Level
Agreement (SLA), (ii) Compliance or accreditation
or certification, (iii) Portability feature, (iv)
Interoperability feature, (v) Geographical location of
the data center (cloud), (vi) Customer support
facilities, (vii) Performance test, (viii) Deployment
models (e.g., private, public, and hybrid clouds) (ix)
Federated identity management solution, (x) Security
measures, and (xi) User recommendation, feedback
and publicly available reviews”. They focus on trust
establishment from the user’s perspective and define
two ways to establish trust: one by hosting trust
models in a centralized storage, in which case, a
trusted third party is required and the other by using
a decentralized trust model which has the drawback
of not preserving privacy.
Similarly, in 2012 they introduced some Quality of
Service (QoS) parameters to be considered in
measuaring trust. Some of them are: “SLAs,
Portability, Interoperability and Geographical
Location, Performance, Security, User feedback,
Customer Support, Service Deployment and
DeliveryModels” [4]. In 2013 a multi-faceted Trust
Management system [6] was introduced by them to
support the customers in identifying trustworthy
cloud providers and it was heavily based on the CSA
trust architecture, basing trust assessments on user
ratings, provider statements, measurements and
property certificates. In the following paragraph a
detailed description of that model is given.
In the paper [6] we could identify wherein the trust
has been considered as an important factor in the
cloud markets. Most of the user issues identified by
Habib et al. in [6] are resolved in their recent paper
[14] which assumes the availability of a suitable
trustworthy cloud service provider.
Their trust assessment is based on the following four
features:
User Ratings
Provider Statements
Measurements
Property Certificates
The choice of the abovefeatures was based on the
results of the CSA questionnaire mentioned above.
The questions focused on the following factors:
Compliance
Data Governance
Facility Security
Human Resources Security
Information Security
Legal
Operations Management
Risk management
Release Management
Resiliency
Security Architecture
However, we argue that attaching a higher weightage
on user ratings destroys the real trust of a service
provider, but makes them more popular in the cloud
markets.
III. Dealing with Trust
Although extensive research has been carried
out on cloud marketplaces, no single study exists
which adequately covers all user requirements for
DBaaS, SaaS, PaaS separately based on trust.
Comparing the highly valued features with their
rankings in existing cloud markets ([15]; [16]) we
conclude that disproportionate weighting is allocated
to trust in most CSPs. In fact, we have identified the
following two specific problems, namely lack of
service level trust and trust saturation and aging in
existing cloud markets.
3.1. Lack of Service Level Trust
Most trust measurement models for cloud services
are based on general cloud trust and not categorised
based on the specific services they provide [6]. For
instance, a particular DBaaS may be competent in
storage service but not in other services such as
computation and data management; such a DBaaS
should have separated different rankings for these
services. As an example, in the month of January
2014, justhost.com was in the 3rd
place of database
ranking list [15] but in the 1st
place in storage
ranking list [16].
3.2. Trust Saturation and Aging
In some cases high popularity of cloud services may
be a function of their long period of service (age) in
the cloud market. In this case, user ratings tend to
maintain higher service provider rankings, adversely
affecting the opportunity for new services in the
marketplace to gain an edge. This phenomenon is
known as trust saturation and it can be explained by
the example of user ratings in the Habib trust model
[6]. Thus, a long history of positive user ratings can
contribute to a high level of trust.
A way to overcome this problem was proposed by
Varadharajan in 2009 with the introduction of two
types of trust measures referred to as “Soft Trust”
and “Hard Trust”. Soft Trust is derived from social
control mechanisms and intangible information such
as reputation, experiences and cooperation while
Hard Trust is derived from concrete security
mechanisms and information such as certificates,
credential tokens and their verifications. Finally, the
4. International Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 6, ( Part -3) June 2015, pp.00-00
www.ijera.com
132|P a g e
overall trust is measured as a combination of these
two [17].
A similar approach is adopted by Garg et al. [18]
where two types of parameters, called quantitative
and qualitative, are defined for ranking cloud service
providers.
In Section 3, we propose our own structure of cloud
marketspace with a focus on providing trust as a
feature for users. Three types of trust measures,
“Direct Trust” and “Relative Trust ” as proposed in
[19] and a high level trust called Transparent Trust,
have been considered in the cloud marketspace
Structure. We shall discuss how the trust can be
generated precisely in our proposed architecture.
IV. Cloud Marketspace
Cloud marketspace is different in operation from
the marketplace (virtual marketplace [20], cloud
computing marketplace [2]) as follows:
Role is different - Cloud marketspace is an online
space where cloud customers and cloud service
providers meet and establish a relationship. But
marketplace sells goods and services directly to the
customer when the payment process is within the
marketplace.
Transaction is different- Cloud marketspace matches
sellers and buyers so that a successful match will
culminate in a transaction. It is not necessary for the
transaction to materialize through the cloud
marketspace but it builds the relationship.
Customer’s loyalty is different -Cloud marketspace
helps customers to select the most appropriate cloud
service provider according to their requirements. In
other words, it helps the customer to scale the trust of
different CSPs who engage in particular user
expected service. The Figure 2 outlines the basic idea
of a cloud marketspace.
Fig2: Difference between Cloud Marketplace and Cloud
Marketspace
Therefore, we define the concept of cloud
marketspace as follows:
A cloud marketspace is an online space that
facilitates bi-directional business. The Cloud Service
Providers (CSP) list their capabilities with evidences
so that cloud customers can match their needs with
CSP’s capabilities. The role of the cloud
marketspace is to match cloud customers’
requirements and CSP’s capabilities and to produce a
list of best matches. Then a successful match can
pave the way for a transaction.
This type of cloud marketspace consists of various
cloud service providers, customers, authenticated
past cloud users or expertise. In short, the operation
of a cloud marketspace can be defined as an online
auction which helps to select cloud service providers
according to user requirements. In other words, a
cloud marketspace can be considered as a
combination of various cloud marketplaces [21] and
CSPs. It is managed by authorized cloud users with
experience and also provides a platform for the user
to get an idea about the standards followed by cloud
service providers.
4.1 Comparison between Proposed Cloud
Marketspace and Other Marketspace Architectures.
It is hard to understand the operation of the
marketspace without having a “radical shift in
thinking from markets defined by physical place to
ones defined by information space” [8]. According
tothefirst basic idea on “marketspace” by Rayport
and Sviokla [8], marketspace transaction is very
different from marketplace transaction. In short, a
direct transaction is maintained within the
marketplace. However only a relationship is
developedwithin the marketspace and the transaction
process is not expected within the marketspace
architecture. A practical usage of this kind of
architecture called “learning
marketspace”wasexplained by Duin [9] in 2001.It
facilitatescollaboration between leaning providers,
learners and the organizations. In other words it
provides a consistent interface to a knowledge
domain. Learners can do the subject selection, course
selection, university selection, discussion with
experts etc. through this learning marketspace.
Whencompared to learning marketspace, our
proposed cloud marketspace architecture ensuresnot
only a collaboration between cloud customers, cloud
service providers and knowledge of experts but also
a trusted environment for CSP selection.
V. Our Proposed Cloud Marketspace
Structure
Our proposed marketspace maintains data on
various cloud service providers. Cloud service
providers who wish to sell their services through the
internet can join the cloud marketspace by disclosing
and entering their features to the storage of CSP’s
capabilities. The cloud marketspace is synthesising
the features of the CSPs and offering these on an
interface with the prospective user.
This cloud marketspace structure explains the CSP
selection in general. It maintains a database of
5. International Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 6, ( Part -3) June 2015, pp.00-00
www.ijera.com 133|P a g e
evidence of trust in each and every cloud service
provider it lists. The cloud marketspace is linked
with databases having answers to questions related
(see Figure 3) to customer requests. For the accuracy
of answers provided by CSPs, the cloud marketspace
compares the authenticated past cloud user
experiences with the evidences provided by CSPs.
Futher it is validated by an independent group of
experts as shown in Figure 3.
For instance, if a user is concerned about trust only,
then it considers only the trust related answers
provided by the CSPs. According to the level of trust
(Low, medium and High) requested by the user, the
number of answers considered by the cloud
marketspace can vary. The cloud marketspace has
the ability to analyse the levels of trust separately.
Therefore, as the customers of this cloud
marketspace, users have the opportunity to select the
required level of trust and level of cost for each and
every service.
Past cloud user experiences based on the history
(failures, certainty, losses etc.) and the independent
group of experts jointhe cloud marketspace, control
and validate the results.
Finally, the cloud marketspace reveals the most
suitable CSP according to the user requested factors
after having a detailed analysis on existing CSPs.
Based on this feedback, the user is able to decide on
which cloud service provider to be chosen. The cloud
marketspace is not involved with any kind of
transaction. This ensures that the cloud marketspace
is consistent with controling trust saturation. The
customer has to establish the relationship externally
with the selected CSP.
Figure 4 explains how a perticular customer can
trace the best choice from the cloud marketspace.
According to Figure 4, the customer has three basic
types of choices according to their necessities and
their awareness of cloud computing. These types of
trust levels ensure the elimination of selections
associated with a cloud service provider simply
based on their long period of service in the cloud
market.The low level of trust is measured with Direct
Trust [19] and medium trust is measured with both
Relative Trust and Direct Trust. Transparent Trust
will be a novel trust level still under consideration by
CSA STAR.
Thus the cloud marketspace can be generalized in
selecting the most appropriate CSP from other
aspects such as quality of service, cost etc. other than
the trust.
VI. Case Study on Transparent Trust
Calculation
The Direct and Relative trustcalculation
methods can be found in a number of publications
([17], [19]). According to the latest released by the
Cloud Security Alliance (CSA) [10], thetypes of
questions considered under trasparency as a service
have been used in the transparent trust calculation in
this architecture. Table 01shows how those questions
can be converted intofactors that can be measured by
assigning values.
Table 01: Transforming Questions into Factors
No
User Raises
Questions
Supportive
Factors
𝒕 𝒙
Factor
ID
𝒕 𝒙.𝒚
1
What does my
cloud
computing
configuration
look like right
now?
On premises 𝑡1.1
Off premises 𝑡1.2
On and off
premises
𝑡1.3
2
Who has
access to my
data now?
Only me 𝑡2.1
CSP or Broker 𝑡2.2
Unknown Third
party
𝑡2.3
3
Where are my
data and
processing
On Premises 𝑡3.1
Off premises in an
authenticated CSP
𝑡3.2
Fig4: Levels of Customer Requirenments on Trust
Fig 3: Structure of the Cloud Marketspace
6. International Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 6, ( Part -3) June 2015, pp.00-00
www.ijera.com
134|P a g e
being
performed?
server.
Off premises in an
unidentified server.
𝑡3.3
4
Who has had
access to my
data?
Only me 𝑡4.1
Known third party-
Authenticated CSP
or broker
𝑡4.2
Unknown
thirdparty
𝑡4.3
5
What audit
events have
occurred in
my cloud
configuration?
User management 𝑡5.1
Group management 𝑡5.2
Project changes 𝑡5.3
Permission changes 𝑡5.4
Workflow changes 𝑡5.5
Notification
changes
𝑡5.6
Custom field
changes
𝑡5.7
Component
changes
𝑡5.8
Version changes 𝑡5.9
6
What
vulnerabilities
exist in my
cloud
configuration?
Continuous scaning
to provide
visibility into both
server and client-
side vulnerabilities
𝑡6.1
Vulnarability
assessment 𝑡6.2
Network security
monitoring 𝑡6.3
Full asset discovery
𝑡6.4
Mobile risk
identification 𝑡6.5
If a particular customer C is interested in transparent
trust measures from selected factors of the CSPs who
are registered in the cloud marketspace, then the final
transparent trust values of each and every CSP is
given by a function 𝑇𝑇 (𝑥𝑐 ).
According to Table 01,if the customer C selected
factors from the question categories 𝑡1, 𝑡4 and 𝑡5and
they were evaluated by expert groups in the
marketspace then the final transparent trust (TT) is a
function of 𝑡1, 𝑡4 𝑎𝑛𝑑 𝑡5 .As the customer C is not
concern of 𝑡2, 𝑡3 , 𝑡6 factors for his required
transparent trust it is not included in the TT
𝑥𝑐 . Hence 𝑥𝑐 is the function value specific to
customer C.
𝑇𝑇 𝑥𝑐 = 𝑓 𝑡1, 𝑡4, 𝑡5 , where
𝑡1, 𝑡4, 𝑡5 < 1 𝑎𝑛𝑑 𝑚𝑎𝑦 𝑏𝑒 𝑛𝑒𝑔𝑒𝑡𝑖𝑣𝑒 𝑣𝑎𝑙𝑢𝑒𝑠.
𝑡1
= 𝑓1 𝑡1.1, 𝑡1.2, 𝑡1.3, 𝛼 … … … … … … … … … … … … 1
𝑡4
= 𝑓4 𝑡4.1, 𝑡4.2, 𝑡4.3, 𝛽 … … … … … … … … … … … … (2)
𝑡5
= 𝑓5 𝑡5.1, 𝑡5.2, 𝑡5.3, 𝑡5.4, 𝑡5.5, 𝑡5.6, 𝑡5.7, 𝑡5.8, 𝑡5.9, 𝛾 . . (3)
The functions 𝑓1, 𝑓4 𝑎𝑛𝑑 𝑓5 have the parameters 𝛼 ,
𝛽 𝑎𝑛𝑑 𝛾 respectively andthose parameters determine
the final decision of the expert groups associated
with the marketspace to the functions. The parameter
𝑡 𝑥.𝑦may assume both positive and negetive values. If
a factor gives positive values to the function
itimplies that the particular CSP is optimisticon the
associated factors. However if it gives negative
values thenit indicates thatthe particular CSP is
destructive on the associated factors. Finally the total
transparent trustTT( 𝑥𝑐) is based on thefactors
𝑡1, 𝑡4 𝑎𝑛𝑑 𝑡5selected by customer C .
VII. Conclusion
The cloud marketspace has been introduced to
act as an intermediator for the selection of cloud
service providers. The terminology is introduced as a
foundation to build standards for cloud resources
trading which establishes relationships through a
trustworthy intermediator.
Furthermore, the paper presented a one-stop cloud
market solution that enables the simulation of
different business cases to market their service
offerings. The proposed solution introduces
advanced aggregated price models and integrates a
new resolution approach that helps customers to
search and select cloud service providers. The
theoretical implication of the proposed approach is a
taxi fleet management application and a trusted
application for CSP selection.
References
[1] S. M. Habib, S. Ries, and M. Muhlhauser,
"Towards a trust management system for
cloud computing", InTrust, Security and
Privacy in Computing and Communications
(TrustCom), 2011 IEEE 10th International
Conference, pp. 933-939.
[2] H. Li, and J. J. Jeng, "CCMarketplace: a
marketplace model for a hybrid cloud",
In Proceedings of the 2010 Conference of the
Center for Advanced Studies on
Collaborative Research, 2010, pp. 174-183.
[3] M. Creeger, "CTO roundtable: cloud
computing", Commun. ACM, 52.8, 2009,pp.
50-56.
[4] S.M. Habib, S. Hauke, S. Ries, and M.
Mühlhäuser, "Trust as a facilitator in cloud
computing: a survey". Journal of Cloud
Computing, 1(1), 2012, pp.1-18.
7. International Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 6, ( Part -3) June 2015, pp.00-00
www.ijera.com 135|P a g e
[5] R. Pennington, H.D. Wilcox, and V. Grover,
"The role of system trust in business-to-
consumer transactions", Journal of
Management Information Systems, Vol 20,
No 3, 2003, pp. 197-226.
[6] S.M. Habib, S. Ries, M. Mühlhäuser, and P.
Varikkattu, "Towards a trust management
system for cloud computing marketplaces:
using CAIQas a trust information
source", Security and Communication
Networks, Vol. 7, No 11,2013, pp. 2185-
2200.
[7] C. Everett, "Cloud computing – A question
of trust. Computer Fraud & Security", 2009,
http://dx.doi.org/10.1016/S1361-
3723(09)70071-5
[8] J.F. Rayport, and J.J. Sviokla"Managing in
the Marketspace",Harvard Business Review,
1994, 72(6), pp. 141-150.
[9] A.H. Duin, L.L. Baer, and D. Starke-
Meyerring, "Educause Leadership
Strategies", volume 4: Partnership in the
Learning Marketspace, San Francisco, CA,
USA: Jossey-Bass, 2001.
[10] Cloud Security Alliance (CSA), "CSA
Security, Trust and Assurance Registry
(STAR) Overview", available at
https://cloudsecurityalliance.org/star/, 2015.
[11] S. Waddington, J. Zhang, G. Knight, J.
Jensen, R. Downing, and C. Ketley, "Cloud
repositories for research data--addressing the
needs of researchers",Journal of Cloud
Computing: Advances, Systems and
Applications, Vol 2, No 1,2013, pp.1-27.
[12] M.
Anita,"ThreeProblemsCloudSecurityCertifica
tinCanSolve",
https://blog.cloudsecurityalliance.org/2010/0
5/17/3-problems-cloud-security-certification-
can-solve/, 2010.
[13] S.M. Habib, S. Ries, and M. Muhlhauser,
"Cloud Computing Landscape and Research
Challenges Regarding Trust and Reputation",
In the Seventh International Conference on
Ubiquitous Intelligence & Computing and
Autonomic & Trusted Computing, 2010, pp.
410-415.
[14] S.M. Habib, V. Varadharajan, and M.
Mühlhäuser, "A framework for evaluating
trust of service providers in cloud
marketplaces",In the Proceedings of the 28th
Annual ACM Symposium on Applied
Computing, 2013, pp. 1963-1965.
[15] Hosting-Review,"Top 10 Database Hosting
Review", Retrieved 24.01.2014, 2014, from
http://www.hosting-review.com/hosting-
directory/top-10-lists/Top-10-Database-
Hosting-Companies.shtml
[16] Top10CloudStorage, "Comparison Table for
Cloud Storage", available at
http://www.top10cloudstorage.com/compare-
specs/.
[17] V. Varadharajan,"A note on trust-enhanced
security", Security & Privacy, IEEE, Vol 7,
No 3, 2009, pp. 57-59.
[18] S.K. Garg, S. Versteeg, and R. Buyya,
"SMICloud: A framework for comparing and
ranking cloud services", In Fourth IEEE
International Conference on Utility and
Cloud Computing (UCC), 2011, pp. 210-218.
[19] W.P.E. Priyadarshani, G.N.
Wikramanayake, and E.M.P. Ekanayake,
"Measuring Trust and Selecting Cloud
Database Services", Advances in Computer
Science: an International Journal, Vol. 2,
2013, pp. 114-120.
[20] M. Tsvetovatyy, M. Gini, B. Mobasher,
Z.W. Ski and W. Ski, "MAGMA: an Agent-
Based Virtual Market for Electronic
Commerce", Applied Artificial Intelligence,
Vol. 11, 1997, pp. 501-523.
[21] J.M. Ferris, and D.P. Huff,"Systems and
methods for multiple cloud marketplace
aggregation", Google Patents", 27.05.2010,
available at
http://www.google.com.jm/patents/US20100
131624.