i-manager's Journal on Cloud Computing (JCC)


Volume 10 Issue 1 January - June 2023

Research Paper

Security Threats and Measures to Overcome in Superior Cloud

Srinivasa Ravi Kiran T.* , S. Naga Sai Nishmitha**, G. Priyanka***
*-*** Department of Computer Science, P. B. Siddhartha College of Arts & Science, Vijayawada, Andhra Pradesh, India.
Kiran, T. S. R., Nishmitha, S. N. S., and Priyanka, G. (2023). Security Threats and Measures to Overcome in Superior Cloud. i-manager's Journal on Cloud Computing, 10(1), 1-6. https://doi.org/10.26634/jcc.10.1.19239

Abstract

Cloud computing is among the most widely used technologies due to its ability to reduce costs, reliability and fast access with increasing flexibility and scalability for computer processes. In recent years, cloud computing has grown rapidly in the IT industry, and IT organizations have expressed concerns regarding security issues with cloud computing. Cloud Computing has some level of risks because essential services are frequently outsourced to a third party, and as third party handles the data stored in the cloud it is harder to maintain data security and confidentiality. This paper provides an overview of security issues or menaces in the cloud and proposes some measures to address them.

Review Paper

A Study on Cloud Container Technology

Viju Prakash Maria John*
School of Computing and Innovative Technologies (Major in Cloud Technologies), British University Vietnam, Hanoi.
John, V. P. M. (2023). A Study on Cloud Container Technology. i-manager's Journal on Cloud Computing, 10(1), 7-16. https://doi.org/10.26634/jcc.10.1.19935

Abstract

Containerization is a crucial technology for automating the management of containers, which can save time and effort. This overview provides valuable insights into cloud container technology, specifically focusing on Swarm Container Orchestration and Automation. The research emphasizes the importance of automation in reducing manual tasks and achieving cost-efficiency. It also highlights the significance of horizontal and vertical scaling for Web Distributed Authoring and Versioning (WebDAV), with considerations of performance, reliability, and cost. Resiliency and redundancy are explored as crucial components for fault tolerance in the WebDAV system. Specific technologies for different aspects of WebDAV's infrastructure, such as compute, user management, storage, networking, databases, resource management, and budgeting, are explored in this paper. These technologies are recommended because they offer the flexibility, scalability, and cost-effectiveness that align with WebDAV's requirements.

Review Paper

Edge, Fog, and Cloud Computing in IoT-Significance and Security Concerns

Shouket Ahmad Kouchay*
Islamic University of Madinah, Munawwarah, Saudi Arabia.
Kouchay, S. A. (2023). Edge, Fog, and Cloud Computing in IoT-Significance and Security Concerns. i-manager's Journal on Cloud Computing, 10(1), 17-29. https://doi.org/10.26634/jcc.10.1.19210

Abstract

Technologies such as cloud, fog, and edge computing offer exceptional solutions for many technical problems in the Internet of Things (IoT). Cloud computing offers enormous flexibility in terms of resource availability and demand. In this paper, the role of cloud, edge, and fog computing in IoT was discussed along with the emergence of numerous IoT smart scenarios which are difficult to implement. This research is important in guiding future network paradigms that require faster processing with less delay and disruption, and the advanced technologies in them can address the challenges of IoT. It also reviews cloud, fog, and edge computing and their relevance to the IoT.

Review Paper

Exploring Traditional and Advanced Cloud Computing Architecture

Ramchand Vedaiyan*
School of Computer Science, Faculty of Engineering & Technology, Malé, Villa College, Maldives.
Vedaiyan, R. (2023). Exploring Traditional and Advanced Cloud Computing Architecture. i-manager's Journal on Cloud Computing, 10(1), 30-37. https://doi.org/10.26634/jcc.10.1.19936

Abstract

This paper explores the fundamental elements of cloud computing architecture, discussing the integration of cloud computing with Big Data, the use of homomorphic encryption, and remote sensing data in cloud architecture. It also examines advanced cloud architectures, such as Hypervisor Clustering architecture, Load Balanced Virtual Server Instances architecture, Zero Downtime architecture, and Resource Reservation architecture, emphasizing their role in enhancing availability and scalability. The paper concludes by showcasing the significance of cloud computing architecture in addressing modern computational and data management challenges.

Review Paper

Securing Cloud Environments: A Comparative Analysis of RSA and MRGA for Enhanced Data Protection

C. Vimala Josphine*
Department of Artificial Intelligence and Data Science, R. M. K Engineering College, Kavaraipettai, Thiruvallur District, Chennai, India.
Josphine, C. V. (2023). Securing Cloud Environments: A Comparative Analysis of RSA and MRGA for Enhanced Data Protection. i-manager's Journal on Cloud Computing, 10(1), 38-46. https://doi.org/10.26634/jcc.10.1.19937

Abstract

Cloud computing revolutionizes the way businesses are stored and managed, and ensures robust security measures. This paper explores the use of Rivest-Shamir-Adleman (RSA) and the Magic Rectangle Generating Algorithm (MRGA) to enhance security in cloud environments. This highlights the growing significance of cloud computing and the need for effective security measures. It then introduces RSA and MRGA as cryptographic algorithms with their unique strengths and applications. It further delves into the benefits of using RSA and MRGA for data protection, key management, authentication, and identity management in cloud environments. The potential of these algorithms to address security challenges in the cloud and improve the overall data security is discussed. Additionally, the abstract acknowledges the limitations and considerations associated with the implementation of the RSA and MRGA. This emphasizes the importance of this research in enhancing cloud security and provides insights into the potential of RSA and MRGA as security measures in the cloud.