IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Virtualization Model for Cloud ComputingSouvik Pal
Cloud Computing is now a very emerging field in the IT industry as well as research field. The advancement of Cloud Computing came up due to fast-growing usage of internet among the people. Cloud Computing is basically on-demand network access to a collection of physical resources which can be provisioned according to the need of cloud user under the supervision of Cloud Service provider interaction. From business prospective, the viable achievements of Cloud Computing and recent developments in Grid computing have brought the platform that has introduced virtualization technology into the era of high performance computing. Virtualization technology is widely applied to modern data center for cloud computing. Virtualization is used computer resources to imitate other computer resources or whole computers. This paper provides a Virtualization model for cloud computing that may lead to faster access and better performance. This model may help to combine self-service capabilities and ready-to-use facilities for computing resources.
Cloud Computing is a versatile technology that can support a broad-spectrum of applications. The low cost of cloud computing and its dynamic scaling renders it an innovation driver for small companies, particularly in the developing world. Cloud deployed enterprise resource planning (ERP), supply chain management applications (SCM), customer relationship management (CRM) applications, medical applications and mobile applications have potential to reach millions of users. In this paper, we explore the different concepts involved in cloud computing. Leveraging our experiences on various clouds, we examine clouds from technical, and service aspects. We highlight some of the opportunities in cloud computing, underlining the importance of clouds and showing why that technology must succeed. Finally, we discuss some of the issues that this area should deal with. The paper aims to provide a means of understanding the model and exploring options available for complementing your technology and infrastructure needs.
nable applications provide as a services for the users
with low computational cost through internet. As we store data
and it also provide services in distributed environment. Cloud
ease its users by providing virtualization technology of resources
through internet. Cloud computing is the emerging field, due to
this reason the various new techniques are still developing. At
current scenario new security challenges were increases for cloud
professionals. Due to lack of security in cloud computing
environment user of cloud lost it trust in cloud. Multi-tenancy,
elasticity, Security Performance and Optimization, etc are
various security issues in cloud computing. In this paper we will
discuss some of the issue in cloud. This paper also discuss some of
the existing security technique for securing a cloud and help
researchers and professionals to know about various security
threats.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Virtualization Model for Cloud ComputingSouvik Pal
Cloud Computing is now a very emerging field in the IT industry as well as research field. The advancement of Cloud Computing came up due to fast-growing usage of internet among the people. Cloud Computing is basically on-demand network access to a collection of physical resources which can be provisioned according to the need of cloud user under the supervision of Cloud Service provider interaction. From business prospective, the viable achievements of Cloud Computing and recent developments in Grid computing have brought the platform that has introduced virtualization technology into the era of high performance computing. Virtualization technology is widely applied to modern data center for cloud computing. Virtualization is used computer resources to imitate other computer resources or whole computers. This paper provides a Virtualization model for cloud computing that may lead to faster access and better performance. This model may help to combine self-service capabilities and ready-to-use facilities for computing resources.
Cloud Computing is a versatile technology that can support a broad-spectrum of applications. The low cost of cloud computing and its dynamic scaling renders it an innovation driver for small companies, particularly in the developing world. Cloud deployed enterprise resource planning (ERP), supply chain management applications (SCM), customer relationship management (CRM) applications, medical applications and mobile applications have potential to reach millions of users. In this paper, we explore the different concepts involved in cloud computing. Leveraging our experiences on various clouds, we examine clouds from technical, and service aspects. We highlight some of the opportunities in cloud computing, underlining the importance of clouds and showing why that technology must succeed. Finally, we discuss some of the issues that this area should deal with. The paper aims to provide a means of understanding the model and exploring options available for complementing your technology and infrastructure needs.
nable applications provide as a services for the users
with low computational cost through internet. As we store data
and it also provide services in distributed environment. Cloud
ease its users by providing virtualization technology of resources
through internet. Cloud computing is the emerging field, due to
this reason the various new techniques are still developing. At
current scenario new security challenges were increases for cloud
professionals. Due to lack of security in cloud computing
environment user of cloud lost it trust in cloud. Multi-tenancy,
elasticity, Security Performance and Optimization, etc are
various security issues in cloud computing. In this paper we will
discuss some of the issue in cloud. This paper also discuss some of
the existing security technique for securing a cloud and help
researchers and professionals to know about various security
threats.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Cloud computing security through symmetric cipher modelijcsit
Cloud computing can be defined as an application and services which runs on distributed network using
virtualized and it is accessed through internet protocols and networking. Cloud computing resources and
virtual and limitless and information’s of the physical systems on which software running are abstracted
from the user. Cloud Computing is a style of computing in which dynamically scalable and often virtualized
resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or
control over the technology infrastructure in the "cloud" that supports them. To satisfy the needs of the
users the concept is to incorporate technologies which have the common theme of reliance on the internet
Software and data are stored on the servers whereas cloud computing services are provided through
applications online which can be accessed from web browsers. Lack of security and access control is the
major drawback in the cloud computing as the users deal with sensitive data to public clouds .Multiple
virtual machine in cloud can access insecure information flows as service provider; therefore to implement
the cloud it is necessary to build security. Therefore the main aim of this paper is to provide cloud
computing security through symmetric cipher model. This article proposes symmetric cipher model in
order to implement cloud computing security so that data can accessed and stored securely.
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...Sushil kumar Choudhary
Cloud computing is a network-based environment that focuses on sharing computations, Cloud computing networks access to a shared pool of configurable networks, servers, storage, service, applications & other important Computing resources. In modern era of Information Technology, the accesses to all information about the important activities of the related fields. In this paper discuss the advantages, disadvantages, characteristics, challenge, deployment model, cloud service model, cloud service provider & various applications areas of cloud computing such as small & large scale (manufacturing, automation, television, broadcast, constructions industries), Geographical Information system (GIS), Military intelligence fusion (MIS), business management, banking, Education, healthcare, Agriculture sector, E-Governance, project planning, cloud computing in family etc.
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...iosrjce
Cloud computing is an important transition that makes change in service oriented computing
technology. Cloud service provider follows pay-as-you-go pricing approach which means consumer uses as
many resources as he need and billed by the provider based on the resource consumed. CSP give a quality of
service in the form of a service level agreement. For transparent billing, each billing transaction should be
protected against forgery and false modifications. Although CSPs provide service billing records, they cannot
provide trustworthiness. It is due to user or CSP can modify the billing records. In this case even a third party
cannot confirm that the user’s record is correct or CSPs record is correct. To overcome these limitations we
introduced a secure billing system called THEMIS. For secure billing system THEMIS introduces a concept of
cloud notary authority (CNA). CNA generates mutually verifiable binding information that can be used to
resolve future disputes between user and CSP. This project will produce the secure billing through monitoring
the service level agreement (SLA) by using the SMon module. CNA can get a service logs from SMon and stored
it in a local repository for further reference. Even administrator of a cloud system cannot modify or falsify the
data.
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Cloud Computing Basics Features and Servicesijtsrd
Cloud computing is an on demand service in which distributed resources, information, software and other devices are provided according to the client's requirement at specific time 1 . Cloud computing involves deploying groups of remote servers and software networks that allow centralized data storage and online access to computer services or resources. In this paper, we explore the different services in different computing platforms and applications. Cloud computing is a service, which offers customers to work over the internet 2 . Kyi Pyar | Me Me Khaing "Cloud Computing Basics: Features and Services" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd27960.pdfPaper URL: https://www.ijtsrd.com/computer-science/distributed-computing/27960/cloud-computing-basics-features-and-services/kyi-pyar
Abstract--The paper identifies the issues and the solution to overcome these problems. Cloud computing is a subscription based service where we can obtain networked storage space and computer resources. This technology has the capacity to admittance a common collection of resources on request. It is the application provided in the form of service over the internet and system hardware in the data centers that gives these services. But having many advantages for IT organizations cloud has some issues that must be consider during its deployment. The main concern is security privacy and trust. There are various issues that need to be dealt with respect to security and privacy in a cloud computing scenario [4].
Keywords--Cloud, Issues, Security, Privacy, Resources, Technology.
Security & privacy issues of cloud & grid computing networksijcsa
Cloud computing is a new field in Internet computing that provides novel perspectives in internetworking
technologies. Cloud computing has become a significant technology in field of information technology.
Security of confidential data is a very important area of concern as it can make way for very big problems
if unauthorized users get access to it. Cloud computing should have proper techniques where data is
segregated properly for data security and confidentiality. This paper strives to compare and contrast cloud
computing with grid computing, along with the Tools and simulation environment & Tips to store data and
files safely in Cloud.
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
The Most great challenging in Cloud computing is Security. Here Security plays key role
in this paper proposed concept mainly deals with security at the end user access. While coming to the
end user access that are connected through the public networks. Here the end user wants to access his
application or services protected by the unauthorized persons. In this area if we want to apply
encryption or decryption methods such as RSA, 3DES, MD5, Blow fish. Etc.,
Whereas we can utilize these services at the end user access in cloud computing. Here there is
problem of encryption and decryption of the messages, services and applications. They are is lot of
time to take encrypt as well as decrypt and more number of processing capabilities are needed to use
the mechanism. For that problem we are introducing to use of cloud computing in SaaS model. i.e.,
scalable is applicable in this area so whenever it requires we can utilize the SaaS model.
In Cloud computing use of computing resources (hardware and software) that are delivered as a
service over Internet network. In advance earlier there is problem of using key size in various
algorithm like 64 bit it take some long period to encrypt the data.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Now a days the work is being done by hiring the space and resources from the cloud providers in order to do work effectively and less costly. This paper describes the cloud, its challenges, evolution, attacks along with the approaches required to handle data on cloud. The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. The need of this review paper is to provide the awareness of the current emerging technology which saves the cost of users.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Revamping quality of service of video streaming over wireless laneSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Sensitivity based optimal location of tcsc for improvement of power system se...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Cloud computing security through symmetric cipher modelijcsit
Cloud computing can be defined as an application and services which runs on distributed network using
virtualized and it is accessed through internet protocols and networking. Cloud computing resources and
virtual and limitless and information’s of the physical systems on which software running are abstracted
from the user. Cloud Computing is a style of computing in which dynamically scalable and often virtualized
resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or
control over the technology infrastructure in the "cloud" that supports them. To satisfy the needs of the
users the concept is to incorporate technologies which have the common theme of reliance on the internet
Software and data are stored on the servers whereas cloud computing services are provided through
applications online which can be accessed from web browsers. Lack of security and access control is the
major drawback in the cloud computing as the users deal with sensitive data to public clouds .Multiple
virtual machine in cloud can access insecure information flows as service provider; therefore to implement
the cloud it is necessary to build security. Therefore the main aim of this paper is to provide cloud
computing security through symmetric cipher model. This article proposes symmetric cipher model in
order to implement cloud computing security so that data can accessed and stored securely.
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...Sushil kumar Choudhary
Cloud computing is a network-based environment that focuses on sharing computations, Cloud computing networks access to a shared pool of configurable networks, servers, storage, service, applications & other important Computing resources. In modern era of Information Technology, the accesses to all information about the important activities of the related fields. In this paper discuss the advantages, disadvantages, characteristics, challenge, deployment model, cloud service model, cloud service provider & various applications areas of cloud computing such as small & large scale (manufacturing, automation, television, broadcast, constructions industries), Geographical Information system (GIS), Military intelligence fusion (MIS), business management, banking, Education, healthcare, Agriculture sector, E-Governance, project planning, cloud computing in family etc.
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...iosrjce
Cloud computing is an important transition that makes change in service oriented computing
technology. Cloud service provider follows pay-as-you-go pricing approach which means consumer uses as
many resources as he need and billed by the provider based on the resource consumed. CSP give a quality of
service in the form of a service level agreement. For transparent billing, each billing transaction should be
protected against forgery and false modifications. Although CSPs provide service billing records, they cannot
provide trustworthiness. It is due to user or CSP can modify the billing records. In this case even a third party
cannot confirm that the user’s record is correct or CSPs record is correct. To overcome these limitations we
introduced a secure billing system called THEMIS. For secure billing system THEMIS introduces a concept of
cloud notary authority (CNA). CNA generates mutually verifiable binding information that can be used to
resolve future disputes between user and CSP. This project will produce the secure billing through monitoring
the service level agreement (SLA) by using the SMon module. CNA can get a service logs from SMon and stored
it in a local repository for further reference. Even administrator of a cloud system cannot modify or falsify the
data.
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Cloud Computing Basics Features and Servicesijtsrd
Cloud computing is an on demand service in which distributed resources, information, software and other devices are provided according to the client's requirement at specific time 1 . Cloud computing involves deploying groups of remote servers and software networks that allow centralized data storage and online access to computer services or resources. In this paper, we explore the different services in different computing platforms and applications. Cloud computing is a service, which offers customers to work over the internet 2 . Kyi Pyar | Me Me Khaing "Cloud Computing Basics: Features and Services" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd27960.pdfPaper URL: https://www.ijtsrd.com/computer-science/distributed-computing/27960/cloud-computing-basics-features-and-services/kyi-pyar
Abstract--The paper identifies the issues and the solution to overcome these problems. Cloud computing is a subscription based service where we can obtain networked storage space and computer resources. This technology has the capacity to admittance a common collection of resources on request. It is the application provided in the form of service over the internet and system hardware in the data centers that gives these services. But having many advantages for IT organizations cloud has some issues that must be consider during its deployment. The main concern is security privacy and trust. There are various issues that need to be dealt with respect to security and privacy in a cloud computing scenario [4].
Keywords--Cloud, Issues, Security, Privacy, Resources, Technology.
Security & privacy issues of cloud & grid computing networksijcsa
Cloud computing is a new field in Internet computing that provides novel perspectives in internetworking
technologies. Cloud computing has become a significant technology in field of information technology.
Security of confidential data is a very important area of concern as it can make way for very big problems
if unauthorized users get access to it. Cloud computing should have proper techniques where data is
segregated properly for data security and confidentiality. This paper strives to compare and contrast cloud
computing with grid computing, along with the Tools and simulation environment & Tips to store data and
files safely in Cloud.
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
The Most great challenging in Cloud computing is Security. Here Security plays key role
in this paper proposed concept mainly deals with security at the end user access. While coming to the
end user access that are connected through the public networks. Here the end user wants to access his
application or services protected by the unauthorized persons. In this area if we want to apply
encryption or decryption methods such as RSA, 3DES, MD5, Blow fish. Etc.,
Whereas we can utilize these services at the end user access in cloud computing. Here there is
problem of encryption and decryption of the messages, services and applications. They are is lot of
time to take encrypt as well as decrypt and more number of processing capabilities are needed to use
the mechanism. For that problem we are introducing to use of cloud computing in SaaS model. i.e.,
scalable is applicable in this area so whenever it requires we can utilize the SaaS model.
In Cloud computing use of computing resources (hardware and software) that are delivered as a
service over Internet network. In advance earlier there is problem of using key size in various
algorithm like 64 bit it take some long period to encrypt the data.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Now a days the work is being done by hiring the space and resources from the cloud providers in order to do work effectively and less costly. This paper describes the cloud, its challenges, evolution, attacks along with the approaches required to handle data on cloud. The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. The need of this review paper is to provide the awareness of the current emerging technology which saves the cost of users.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Revamping quality of service of video streaming over wireless laneSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Sensitivity based optimal location of tcsc for improvement of power system se...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Characterization of mixed crystals of sodium chlorate and sodium bromate and ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Loc, los and loes at speed testing methodologies for automatic test pattern g...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Experimental study of the forces above and under the vibration insulators of ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Fpga implementation of run length encoding with new formulated codeword gener...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Thermal, microstructure and dielectric behavior of la modified bismuth titana...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Implementation and analysis of power reduction in 2 to 4 decoder design using...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Performance analysis of dwdm based fiber optic communication with different m...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Numerical analysis of influence of deep excavation on nearby existing tunneleSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Text independent speaker recognition using combined lpc and mfc coefficientseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Addressing the cloud computing security menaceeSAT Journals
Abstract Cloud Computing is fast gaining popularity today with its scalable, flexible and on-demand service provision. It brings cost saving and agility to organization with pay-as-you-go approach. Abundant resources are available and the user has a huge range to select from. Cloud facilitates virtualization, simplification, automation and accelerated delivery of application and services for a sustainable business advantage. As much as the technological benefit, cloud computing also has security issues. Security in cloud computing is essential for providing quality of service. In this paper we address security issues which concern cloud computing environment today. We analyze Cloud Computing and security menace it faces due to different threats. Index Terms: Cloud Computing, Cloud Service Provider (CSP), Cloud Security, Cloud User, SaaS, PaaS, IaaS, StaaS
Latest development of cloud computing technology, characteristics, challenge,...sushil Choudhary
Cloud computing is a network-based environment that focuses on sharing computations, Cloud computing networks access to a shared pool of configurable networks, servers, storage, service, applications & other important Computing resources. In modern era of Information Technology, the accesses to all information about the important activities of the related fields. In this paper discuss the advantages, disadvantages, characteristics, challenge, deployment model, cloud service model, cloud service provider & various applications areas of cloud computing such as small & large scale (manufacturing, automation, television, broadcast, constructions industries), Geographical Information system (GIS), Military intelligence fusion (MIS), business management, banking, Education, healthcare, Agriculture sector, E-Governance, project planning, cloud computing in family etc. Keywords: Cloud computing, community model, hybrid model, Public model, private model
Cloud computing is very useful then also its own set of cons discourage cloud users to choose them as a best option. The multitenant architecture of cloud exposed to several threats such as improper trust management at service provider site, Storage security, Shared technology vulnerabilities, data lost/leakage during transit, unauthorized access of data. This paper studied review work on cloud steganography.
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
Cloud computing is a model for enabling convenient, on-demand network access
to a shared pool of configurable computing resources. Reliability in compute cloud is an
important aspect in Quality of Service which needs to be addressed in order to foster the
adoption of compute cloud. In today’s integrated environment the distributed systems is
employed to carry out computational intensive task at a faster rate without much
investment. The Cloud is a multitenant architecture which allows faster computation with
high scalability at a lower cost thereby the users can share the same physical infrastructure.
Individual customers deploy their applications in such environment will occupy the virtual
partitions on the platform. This paper describes a straightforward procedure to analyze the
reliability of the application from the view point of the resource provider. A trust
component is implemented to provide preventive control and to mitigate the occurrence of
any non-permissible action by using the detective mechanism. Such mechanisms are used to
identify the privacy risk and it further prevents from utilization. Hence, in this paper trust
assessment is performed before the user is allowed to share the multitenant infrastructure.
The cloud can provide scalable and reliable service for the legitimate users. The proposed
work is tested using tools Aneka and Globus Toolkit.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...ijtsrd
Cloud computing is an emerging model of business computing. Cloud computing is a service, which offers customers to work over the internet. It simply states that cloud computing means storing and accessing the data and programs over the internet rather than the computer's hard disk. The data can be anything such as music, files, images, documents, and many more. The user can access the data from anywhere just with the help of an internet connection. To access cloud computing, the user should register and provide with ID and password for security reasons. The speed of transfer depends on various factors such as internet speed, the capacity of the server, and many more. In this paper, we explore the understanding the determinates of security and privacy in cloud computing, Cloud Computing architecture and We also address the characteristics and applications of several popular cloud computing platforms. We identified several challenges from the cloud computing adoption perspective and we also highlighted the cloud interoperability issue that deserves substantial further research and development. However, security and privacy issues present a strong barrier for users to adapt to cloud computing systems. Yin Myo Kay Khine Thaw | Khin Myat Nwe Win "Understanding the Determinants of Security and Privacy in Cloud Computing Architecture" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26452.pdfPaper URL: https://www.ijtsrd.com/computer-science/distributed-computing/26452/understanding-the-determinants-of-security-and-privacy-in-cloud-computing-architecture/yin-myo-kay-khine-thaw
In this paper we are study-ing about cloud computing, their types, need to use cloud computing. We also study the architecture of the mobile cloud computing. So we included new techniques for backup and restoring data from mobile to cloud. Here we proposed to apply some compres-sion technique while backup and restore data from Smartphone to cloud and cloud to the Smartphone.
Cloud computing is architecture for providing
computing service via the internet on demand and pay per use
access to a pool of shared resources namely networks, storage,
servers, services and applications, without physically acquiring
them. So it saves managing cost and time for organizations. The
market size the cloud computing shared is still far behind the one
expected. From the consumers’ perspective, cloud computing
security concerns, especially data security and privacy protection
issues, remain the primary inhibitor for adoption of cloud
computing services. The security for Cloud Computing is
emerging area for study and this paper provide security topic in
terms of cloud computing based on analysis of Cloud Security
treats and Technical Components of Cloud Computing
The Slide Explains the concepts of Cloud Computing. Covers various definitions of Cloud Computing. Its Models, Types, Advantages, Challenges. A must to understand what is Cloud Computing.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Similar to Total interpretive structural modelling on enablers of cloud computing (20)
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Total interpretive structural modelling on enablers of cloud computing
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 06 | Jun-2014, Available @ http://www.ijret.org 398
TOTAL INTERPRETIVE STRUCTURAL MODELLING ON ENABLERS
OF CLOUD COMPUTING
Ambikadevi Amma.T1
, N.Radhika2
, Pramod.V.R3
1
Research Scholar Karpagam University Coimbatore, TamilNadu
2
Associate Professor, Computer Science & Engg Dept, Amrita vishwa vidyapeetham, Coimbatore, TamilNadu, India
641105
3
Associate. Professor, Dept. of Mechanical Engineering, NSS College of Engg, Palakkad, Kerala, India 678008
Abstract
Cloud computing is the delivery of computer resources over a network through web services, while the actual physical location
and organization of the equipment hosting these resources are unknown to the users. Cloud computing strategy is subjected to
many enablers. Interpretive structural modeling is a well proven tool for finding the interrelationship among the enablers. Total
Interpretive structural model is an essential innovative version of interpretive structural modeling technique(ISM). In Total
Interpretive Structural Modeling (TISM), influence/enhancement of enablers and their interrelationship is considered. Total
interpretive structural model steps are identification of elements, pair-wise comparison, level partition, interaction formation,
diagraph representation and formation of total interpretive structural model. The methodology of TISM is used to delineate the
hierarchical relationship of enablers of cloud computing. Cloud computing is based on the concept of virtual machines. Hardware
cost can be reduced by using virtualization. Different types of virtualization are operating system –level virtualization, application
virtualization, service virtualization, memory virtualization, storage virtualization, virtual file system, data virtualization etc .Lack
of trust between cloud users and providers has hindered the universal acceptance of cloud as outsourced computing services. To
promote Multitenency we must design the cloud ecosystem to be secure, trustworthy and dependable
Keywords: cloud computing, enablers, partition levels, interaction matrix, TISM.
---------------------------------------------------------------------***--------------------------------------------------------------------
1. INTRODUCTION.
Cloud Computing is a new scenario in which customers can
use the services and infrastructures by paying an amount for
the usage. This is beneficial to some of the IT organizations
undergoing severe budgetary constraints for the
development of infrastructures and enhancement of
hardware’s and software’s. The core technologies used in
cloud are web applications, services, virtualization and
cryptography. The services rendered through cloud are
Software as a Service (SaaS), Infrastructure as a Service
(IaaS), and Platform as a Service (PaaS). In Software as a
Service, the service providers provide the users the service
of using any type of application software. In IaaS, the
service providers provide the networking equipment, storage
backups and servers. In PaaS service providers provides the
platform to the users any type of operating the systems along
with hardware’s & Software’s.
The deployment models available for cloud are private
cloud, public cloud and hybrid cloud. In public cloud the
users are accessing the cloud services using internet
facilities. Private cloud. The deployment models available
for cloud are private cloud, public cloud and hybrid cloud.
In public cloud the users are accessing the cloud services
using internet facilities. Private cloud provides resources to
users within an enterprise or organization over an intranet
using a self service interface. Hybrid cloud is a combination
of both public cloud and private cloud. In hybrid, the private
clouds can break through the private cloud to access
additional computing resources from the public cloud.
The main characteristics of clouds are (a) On demand self
service- Users can use the services without human
interaction (b) Ubiquitous network access- Using standard
mechanisms and protocol cloud services are accessed using
network usually internet. (c) Resource pooling:- Resource
pooling is done using a homogeneous sharing between
service users. (d) Elasticity: Resources can be stored up and
down rapidly. (e) Pay-as-you-go: Resource usage is
constantly measured and pay only for what you use.
Some of the IT organizations are undergoing severe
budgetary constraints depends on clouds for the
infrastructure and services. The strategy of cloud computing
is facing many barriers. The major attributes of cloud
computing are Multitenency, massive scalability, elasticity,
pay as you use and self provisioning of resources of the
cloud[ 1 ]. An acronym “SPI” stands for the services of the
cloud, Software–as-a-Service (SaaS), Platform-as-a-Service
(PaaS) and Infrastructure-as-a-Service (IaaS) [ 1 ]. Cloud
computing impacts an individual consumer, individual
business, small and medium size businesses and enterprise
businesses etc. Data are moving from and into the cloud in
large amounts, so the security control failures or impact of
mistakes will affect the customers. The idea behind the
paper is to get the inhibitors in the cloud environment and
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 06 | Jun-2014, Available @ http://www.ijret.org 399
make a study under ISM and get the relationship among the
inhibitors
Cloud computing is the delivery of computing as a service
rather than a product, whereby information are provided to
computers and other devices as a utility over a network.
Cloud computing describes a new supplement ,
consumption, and delivery model for IT services based on
internet protocols, and it typically involves provisioning of
dynamically scalable and often virtualized resources. Cloud
computing providers deliver application via the internet,
which are accessed from a web browser.
2. LITERATURE SURVEY
Cloud computing is an emerging scenario of computing
style where applications, datas and resources are provided to
users as services over the web. Consumers are not worried
about the implementation of the cloud but they care about
what the service does for them. Cloud computing provides
configurable computing resources like servers networks
storage and applications as and when required with
minimum effort over the internet. The major critical success
factor of cloud computing are consistent data availability
and security. Data centre facility uses to house computer
systems and associated components. It includes redundant
power supply, data communication connections and security
devices etc. Clouds are location independent providing
abstract datacenter. Virtual servers, storage devices and
networking are provided without human interaction. A
consumer can provision computer facilities like server times
and network storage. The cloud capabilities are available
over the network and accessed through standard
mechanisms like mobile phones laptops and personal digital
assistants. Using multitenant model the providers computing
resources are pooled to serve multiple customers. The
computing resources include storage, processing, memory,
network bandwidth and virtual machines. Cloud capabilities
can be rapidly, elastically and even automatically sealed out
and rapidly released to quickly scale in. By leveraging a
metering capacity at some level of abstraction, cloud
systems automatically controls and optimize resource use.
Transparency is provided for both the provider and
consumer regarding the resource usages. The resource usage
is monitored, controlled and reported. Standardization and
visualization are the keys to reduce infrastructure costs
while meeting the dynamic needs of business.
Many organizations are migrating to cloud to derive
flexibility and cost reduction benefits from their computing
environment. Reasons why cloud computing is popular with
business are cost factor, flexibility and service provisioning
of the resources. Self service portal allows the clients to help
themselves and makes the offering more available from a
service perceptive. Automation reduces IT operations costs.
Cloud paradigm improves service delivery by applying
engineering disciple and scale of economics in an internet
inspired architecture.
Cloud deployment models are public cloud, private cloud
and hybrid cloud. In public cloud the business rents and pay
for what they use on demand. In private cloud the service is
on their organization network in its IT environments and
delivers servicers to their users only. Hybrid cloud uses the
combination of both public and private cloud. Public cloud
services are available to customers from a third party service
provider via the internet. Public clouds provide cost-
effective means to deploy solutions. Companies can use it
on demand and with the pay-as-you use policy
Private clouds are deployment made inside the on-premise
data centers and run by on site servers. Like public cloud
private cloud offers cloud computing environment such as
elastic on demand capacity, self service provisioning and
service based access.
Hybrid cloud is a combination of interoperating public and
private clouds. Hybrid models allow elasticity pay- as- you –
go pricing, network isolation and secure connectivity just
like privately owned data centre.
Cloud computing provides massively scalable computing
resources from anywhere simplifies service delivery. It
provides rapid innovation and dynamic platform for next
generation datacenters. Use of virtualization and limited
capabilities for monitoring access to applications hosted in
the cloud. Data privacy is another factor concerning
security. Quality of services like availability, reliability and
performances are major security issues. No well defined
service level agreements to meet standards. Integration and
interoperability are also barriers to cloud.
Some of the features of the cloud are discussed herewith.
Self service is one of the important features of the cloud.
Using role-based access control it separate authenticated
end-users. Dynamic workload management enables the
datacenters with automation. Resource automation
establishes secure Multitenency and helps prevent
contention in the load aware resource engine. Enabling the
feature charge back, show back and metering the
transparency in cloud business is attained. Cloud is
integrated with the products in the datacenter. It is possible
to meter the cloud resource usage. Cloud support most of the
operating systems and is possible to vary hardware
configuration. Role-based access administrations are used
for providing secure Multitenency and bring security to the
self-service cloud portal.
3. METHODOLOGY
ISM is an interpretive methodology goes as the judgment of
the group decides the relationship of different elements in
the system. An overall structure is extracted from the set of
elements hence it is structural in the basis of mutual
relationships and the overall structure are portrayed in a
diagraph model hence it is a modeling technique. Total ISM
is also following some of the steps of ISM. Reachability
and partition levels are adopted as it is in the process of
TISM .It is having a step by step process and is briefly
outlined below.
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 06 | Jun-2014, Available @ http://www.ijret.org 400
3.1 Step I: Elements Identification and Definition
First step in any structural modeling is to identify the
elements whose relationship is to be modeled. For this
purpose the enablers of cloud computing are identified from
literature survey and discussions with domain experts and is
shown in table1.
Table 1: Major enablers of cloud computing and their definitions
3.2 Step II: Contextual Relationship Definition
Model of the structure is developed by relating the elements.
The contextual relationship between different elements are
identified for the study is depicted in table1.for example the
contextual relationship between different enablers for study
is enabler1 will influence/enhance enabler2 etc. Experts’
opinion is solicited to capture the contextual relationship
among the elements.
3.3 Step III Relationship Interpretation
This step forwarded over the traditional ISM. Contextual
relationship in ISM remains silent on how that relationship
really works. In TISM explanation of how the enablers
influence /enhance with each other is considered. It also
explain in what way they influence /enhance each other
3.4 Step IV: Pair-Wise Comparison
A pair-wise comparison of elements is used to develop
SSIM (Structured self interaction matrix.) in formal ISM.
This interpretation indicates direction of relationship only.
TISM make use of the concept by answering the interpretive
query in step III for each paired comparison first element
should be compared to all the elements in the row .For each
comparison the entry should be Yes (Y) or No (N).The
reason for yes should be provided. Comparing all the row
elements a paired relationship in the form of interpretive
logic –knowledge base is obtained Table2.
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 06 | Jun-2014, Available @ http://www.ijret.org 401
Table 2: Interpretive logic-knowledgebase
3.5 Step V: Reachability Matrix and Transitivity
Check
Corresponding to Y in the knowledge base cell is replaced
by 1and N is replaced by 0. Check for transitivity and
reachability matrix is shown in Table 3.
Table 3: Initial Reachability matrix
3.6 Step VI: Level Partition in Reachability Matrix
ISM based level partition is carried out. Reachability set and
antecedent sets for all the elements are determined.
Intersection of the two sets is found out. The elements for
which the reachability set and intersection set are same
occupy the top level in ISM hierarchy. Top level elements
will not influence the remaining elements hence it can be
removed from further calculation. The same process is
repeated until the levels of each element is found out. Level
partition is shown inTable 4.
5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 06 | Jun-2014, Available @ http://www.ijret.org 402
Table 4: 1ST
Level partition
Enablers Reachability set Antecedent set Intersection Level
1 1,2,3,4,6,7,8,9,10,11 1,2,3,4,5,6,7,8 1,2,3,4,6,7,8
2 1,2,4,6,7 1,2,3,4,8,9,10,13 1,2,4
3 1,2,3,4,6,7,9 1,3,4,5,7,12 1,3,4,7
4 1,2,3,4,6,7 1,2,3,4,5,7,9,12 1,2,3,4,7
5 1,3,4,5,6,7,8,11,12 5,8 5,8
6 1,6,8,11,12 1,2,3,4,5,6,7,8 1,6,8,12
7 1,3,4,6,7,8,12 1,2,3,4,5,7,8,12 1,3,4,7,8,12
8 1,2,5,6,7,8,9,11,12 1,5,6,7,8,12 1,5,6,7,8,12
9 2,4,9,10,11 1,9,10,13,14,15 9,10
10 2,9,10,11 1,9,10,13,14,15 9,10
11 11 1,5,6,8,9,10,11,12,13,14 11 1
12 3,4,7,8,11,12 5,6,7,8,12 7,8,12
13 2,9,10,11,13,14,15 13,14,15 13,15
14 9,10,11,14,15 13,14,15 14,15
15 10,13,14,15 13,14,15 13,14,15
Table 5: levels of enablers
3.7 Step VII: Diagraph Development
The elements are arranged graphically in levels and links are
drawn as per the relationship. Diagraph is used to represent
the elements and their interdependence in terms of nodes
and edges. The elements are arranged graphically in levels
and the directed links are drawn as per the relationship
shown in reachability matrix.It is shown in Figure 1.
Enablers Reachability Antecedent Intersection Level
1 1,6,12 1,2,3,4,6,7 1,6 6
2 2,4 2,3,4 2,4 8
3 3 3 3 9
4 2,4 2,3,4 2,4 8
5 1,3,4,5,6,7,8,12 5,8 5,8 5
6 1,6,12 1,2,3,4,6,7 1,6 6
7 3,4,7,12 7,12 7,12 7
8 1,3,4,5,6,7,8,12 5,8 5,8 5
9 2,4,9,10 1,3,8,9,10,13,14 9,10 2
10 2,4,9,10 1,3,8,9,10,13,14 9,10 2
11 11 1,5,6,8,9,10,11,12,13,14 11, 1
12 3,4,7,12 7,12 7,12 7
13 2,13 13 13 4
14 14,15 13,14,15 14,15 3
15 14,15 13,14,15 14,15 3
6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 06 | Jun-2014, Available @ http://www.ijret.org 403
Fig 1 Diagraph with significant transitive links
3.8 Step VIII: Interaction Matrix
The final diagraph is translated into a binary interaction
matrix form depicting all the interactions by 1 in cells.
Remaining cells entry is 0. Cells with entry 1 are interpreted
by picking the relevant interpretation from the knowledge
base in the form of interpretation matrix.The interaction
matrix is shown in Table 6.and explanation is following the
matrix representation
Table 6: Interaction Matrix
E1 E2 E3 E4 E5 E6 E7 E8 E9 E10 E11 E12 E13 E14 E15
E1 1 0 0 0 1 1 0 0 1 0 0 0 0 0 0
E2 0 1 0 1 0 0 1 0 0 0 0 0 0 0 0
E3 1 1 1 0 0 0 0 0 1 0 0 0 0 0 0
E4 0 1 0 1 0 0 0 0 0 0 0 0 0 0 0
E5 0 0 0 0 1 0 0 1 0 0 0 0 1 0 0
E6 1 0 0 0 0 1 0 0 0 0 0 0 0 0 0
E7 1 0 0 0 0 0 1 0 0 0 0 1 0 0 0
E8 0 0 0 0 1 0 0 1 0 0 0 0 0 0 0
E9 0 0 0 0 0 0 0 0 1 1 1 0 0 0 0
E10 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0
E11 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0
E12 0 0 0 0 0 0 1 0 0 0 0 1 0 0 0
E13 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0
E14 0 0 0 0 0 0 0 0 1 0 0 0 0 1 1
E15 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1
E1-E5- Multitenency means same data is pooled among a
pool of users. Data protection is Important in the sense the
pooled data should be accurate I all means.
E1-E6- Operational efficiency depends on data protection.
Data is to be stored securely in the cloud. Therefore cloud
service can be increased by increasing operational
efficiency.
E1-E9- Authorizations in the sense, only privileged
customers are directed to use cloud. Data can be protected
by providing security measures using cryptographical
methods.
E2-E4- Data availability to customers depends upon
protected data. Cloud services can be improved by providing
datas availability.
E2-E7- Elasticity, means datas can be increased and
decreased as per the users
7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 06 | Jun-2014, Available @ http://www.ijret.org 404
E3-E1- Data integrity means datas should remain without
any change in the original data. This can be done if and only
if data is protected securely.
E3-E2- Data for consumers should remain in the original
form. Confidentiality of approach of cloud may improve if
data integrity is preserved.
E3-E9- By providing authorization the data integrity can be
preserved.
E4-E2- Datas searching in cloud database must be available
for the user thereby increasing the confidentiality level of
the users.
E5-E8- Multiple users are able to use the same data from the
pool of data. Interoperability of the system can be improved
by Multitenency
E5-E13- mapping of data depends upon data availability.
E6-E1- Operational efficiency is directly proportional to the
data protection cloud. Efficiency can be increased by
protecting data in cloud. Consumers may have very good
opinion of the data so many are forced to use the cloud
thereby increasing the efficiency.
E7-E1- the data using can be increased or decreased
depending on users view. Elasticity can be applied if and
only if clouds data is protected.
E7-E12- Common standard in cloud is necessary since the
clouds operation is from different countries.
E8-E5- Interoperability among different clouds may affect
Multitenency.
E9-E10- The hacking can be prevented by giving protection
using authorization.
E9-E11- Guidance can be improved by improving
authorization.
E10-E9- Auditing can be improved by using authorization.
E12-E7- Common standard for cloud will definitely improve
elasticity.
E13-E14- Data reminance depends upon data lineage.
E14-E9- Data reminance depends on data auditing
E14-E15- Data prominence and data reminance are related
to each other
E15-E14- . The residue of the data and the data
computationally correct depends each other.
3.9 Step IX: Total Interpretive Structural Model
The information contained in the interpretive matrix and
diagraph are used to obtain TISM
The nodes are replaced with boxes containing elements.
Interpretation is depicted on the side of the links. The total
interpretive structural model is shown in Figure 2.
Fig 2: Total Interpretive Structural Model
8. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 06 | Jun-2014, Available @ http://www.ijret.org 405
4. RESULTS AND DISCUSSIONS
Inhibitors are put in different levels, so as to get the
interrelationship of inhibitors. Level partition is done by
considering reachability set, antecedent set and intersection
set as described in the section. There are nine Partition
levels. The elements coming under each level is discussed
below. The inter relationship of enablers are found out.
From the diagraph, guidance is first level element i.e. The
top most element .Removal of the top most elements will
not affect the system. The second level elements are
authorization and auditing. Third level element data
provenance and data reminance. Data lineage is coming
under fourth level. Multitenency and inter operability are in
the fifth level. Data protection and operational efficiency are
in sixth level. Standards and elasticity are coming under
seventh level. Data availability and confidentiality are
coming under eight levels. Data integrity is in ninth level.
Interrelationship among them is also shown in the Figure no.
1. Data integrity is very essential and cloud service
providers should have to take precautions for data integrity.
Data integrity is directly related to confidentiality and data
availability. Confidentiality has an indirect relation to data
protection. Standards are related to interoperability. The
reason is that if all cloud service providers are having same
standards then the operation on cloud become very easy.
Data protected in cloud means data integrity is preserved. So
they are related to each other. Operational efficiency
depends on the availability of data. If all the datas are
available operational efficiency can be increased. Data
protection can be done by considering authorization.
Authorization can be done by giving password protection
and by providing cryptographic protection. Data lineage
means mapping of data’s and visualization of data. Data
lineage is very important for auditors’ assurance. So it is
related to auditing. Confidentiality can be increased by
proper authorization. In the sense protection of data by using
password and cryptography.
5. CONCLUSIONS
Enablers of cloud computing are studied and their
interrelationship is figured out. Total interpretive structural
modeling is used. Difference between ISM and TISM is that
in TISM the interpretation and logic behind the expressed
relation is clarified where as in ISM no such clarification is
given. Relationship of the inhibitors is shown in diagraph.
Clarification in TISM may be through the experts.
Contextual relationship in SSIM remains silent in ISM
whereas in TISM the real working is considered. TISM of
enablers of cloud computing is drawn and the relationship is
explained in interaction matrix. Data integrity, data
availability, data security, confidentiality, operational
efficiency, standards, authorization .interoperability are
coming as major enablers. Major enablers should be
considered before going for cloud installation.
Confidentiality and data protection are related to each other.
Elasticity is depending on standards and standard can
enhance interoperability proper standard will entertain the
cloud computing services hence the Data lineage
dependence on data auditing. The reason is that data
consumed or used can be audited by third party auditors.
REFERENCES
[1]. Tim Mather, Subra Kumaraswamy, Shahed Latif,
“Cloud Security and Privacy- AnEnterprise Perspective on
Risks and Compliance” O Reilly
[2]. Wang.C and Wulf W. A., “Towards a framework for
security measurement”, 20th National Information Systems
Security Conference, Baltimore, MD, Oct. 1997, pp. 522-
533.
[3]. Savola.R and Abie.H, “Development of measurable
security for a distributed messaging system,” International
Journal on Advances in Security, Vol. 2, No. 4 (2009), 2010.
[4]. Jaquith. A, “Security metrics: replacing fear, uncertainty
and doubt,”Addison-Wesley,
2007.
[5]. Gadia.S, “Cloud computing: an auditor’s perspective,”
ISACA Journal, Vol. 6, 2009.
[6]. Gellman.R, “Privacy in the clouds: risks to privacy and
confidentiality from cloud computing,” World Privacy
Forum (WPF) Report, Feb. 23, 2009.
[7]. Cloud Security Alliance, “Top threats to cloud
computing”, Version 1.0. Downloaded from:
www.cloudsecurityalliance.org [July 4, 2010].
[8]. Cloud Security Alliance. www.cloudsecurityalliance.org
[July 4, 2010].
[9]. Mandal.A, Deshmukh.S, Vendor selection using
interpretive structural modeling (ism). International Journal
of Operations and Production Management, 1994, 14(6):
52–59.
[10]. Sage.A, Interpretive Structural Modeling:
Methodology for Large-scale Systems, 91–164. McGraw-
Hill, New York, 1977. 15. Attri R., Grover S., Dev N. and
Kumar D., An ISM approach for modelling the enablers in
the implementation of TotalProductive Maintenance (TPM),
International Journal SystemAssurance Engineering
andManagement,DOI:10.1007/s13198-012-0088-7 (2012)
[11]. Warfield.J. Developing interconnection matrices in
structural modeling. IEEE Transactionsons on Systems, Man
and Cybernetics, 2005, 4(1): 81–67.
[12]. Attri R., Grover S., Dev N. and Kumar D., Analysis
ofbarriers of Total Productive Maintenance
(TPM),International Journal System Assurance Engineering
andManagement, DOI: 10.1007/s13198-012-0122-9 (2012)
[13]. Raj T. and Attri R., Quantifying barriers to
implementingTotal Quality Management (TQM), European
Journal of Industrial Engineering, 4(3), 308-335 (2010)
[14]. Ravi.V. and Shankar. R. (2005), Analysis of
interactions among the barriers of reverse logistics,
Technological Forecasting and Social Change, 72(8): 1011-
1029.
[15]. Thakkar. J.,Kanda.A. and Deshmukh, S.G. (2008),
Interpretive Structural Modeling (ISM) of IT-enablers for
Indian manufacturing SMEs’, Information management &
Computer Security, Vol. 16 No.2, pp. 113-136
[16]. Quan Liu, Lu Gao, Ping Lou, “Resource Management
Based on Multi-Agent Technology for Cloud
Manufacturing, IEEE 2011
[17]. Farzad Sabahi, “ Cloud Computing Security Threats
9. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 06 | Jun-2014, Available @ http://www.ijret.org 406
and Responses” IEEE, 2011.
[18]. Craig A Lee, “ A Perspective on Scientific Cloud
Computing”, ACM 2010
[19]. P. Sasikala, “ Cloud Computing: present status and the
future implications”, Inderscience Enterprises Ltd. 2011