An OptiAssign-PSO Based Optimisation for Multi-Objective Multi-Level Multi-Task Scheduling in Cloud Computing Environment
Advanced Analytics for Disease Tracking & Remote Intravenous Injection Monitoring
DevKraft - Fueling Collaboration in Coding Challenges
Comparative Security and Compliance Analysis of Serverless Computing Platforms: AWS Lambda, Azure Functions, and Google Cloud Functions
Blockchain Healthcare Management using Patients
A Comprehensive Review of Security Issues in Cloud Computing
An Extended Min-Min Scheduling Algorithm in Cloud Computing
Data Quality Evaluation Framework for Big Data
An Architectural Framework for Ant Lion Optimization-based Feature Selection Technique for Cloud Intrusion Detection System using Bayesian Classifier
Be Mindful of the Move: A Swot Analysis of Cloud Computing Towards the Democratization of Technology
GridSim Installation and Implementation Process
A Survey on Energy Aware Job Scheduling Algorithms in Cloud Environment
Genetic Algorithm Using MapReduce - A Critical Review
Clustering based Cost Optimized Resource Scheduling Technique in Cloud Computing
Encroachment of Cloud Education for the Present Educational Institutions
The society is getting more and more electronic every day, as the usage of the hard currency from their pockets is now reduced to the e-cards or online. In India, the flow of money from a person pocket has changed in the recent decades. This paper’s main aim is using cloud computing technology for the cashless economy in India by strong bond and relationship with the cloud computing technology and cashless economy. The scope of advanced research technology by using cloud computing technology in the current financial system, block chain technology should be implemented, as it has leverage over crypto currency that can help counteract money laundering and terrorist funding in the country and around the world to accomplish the cashless economy in India. The statistical report relayed that the present online banking transaction system is highly secure enforcing about 15% of people's transaction in India.
Cloud Computing is an advance technology that provides different services to the users on the rental basis. The main issue associated with the cloud is cyber attacks that are performed on the cloud services due to the improper security mechanisms especially authentication. In this paper, a multi level security using hybrid multifactor authentication methodologies based on the security questions, mobile OTP, and biometric authentication in addition to password based authentication to protect the data/services from the cyber attackers is proposed. The hybrid methodologies provides strong and secure authentication due to the two layer security. The biometric authentication includes face image as an authentication factor and the extraction of the face features are performed using VGG face model with the concept of transfer learning. The proposed work is implemented in the Google Colab cloud with python API and evaluated results show the proposed scheme providing privacy, confidentiality, integrity, and resistivity against the collision resistance attack, replay attack, tampering of the data, etc.
The world today is almost working on machines which are releasing hazardous gases and cloud is mainly working on the machine environment. The users of Cloud computing are gradually increasing due to its key technology in the computing environment. The Cloud Computing Technology deploys enormous elegant and sophisticated computers which extricates poisonous particles into the environment. For this reason, a design is needed to focus on the features on making cloud energy-efficient concerning the power efficiency. In this paper, some of the algorithms are proposed to overcome the problem.
Blockchain technology is one of the latest innovations that provide a secured, decentralized, distributed database of records of all transaction and digital events. In recent years, blockchain technology is being applied in many powerful applications such as financial services, smart contracts, healthcare, supply chain management, e-voting etc. As blockchain ensures high security, it is being trusted and accepted by many business organizations. Consensus algorithms are the primary component of blockchain technology that maintains integrity and security in blockchain. This paper reviews various blockchain based data sharing architectures and their consensus algorithms that were proposed in the recent years for data sharing security. The importance of consensus algorithms in blockchain, and their advantages and disadvantages are discussed in this paper.
A wise person is the basis of counseling just as cloud computing is a computer particle. Cloud computing is an unmistakable, limitless, unchanged, remarkable, upright, pervasive technology of the present period. This also pursues enormous capability to support all end users with fancy facilities. Cloud computing has multi-tenancy features, virtualization, load balancing technology, security, scheduling and much more. Cloud computing Virtualization (helping design of the cloud) enables users to access several virtual machines or their features, delivering pay-per-use services to those. Load Balancing is one of the big issues of cloud computing. Load balancing is the strategy used to divide the load between various computing elements that are available and to equalize load with virtual machines to achieve efficiency and improve the throughput. Cloud computing is a massive network and behaves heterogeneously. But it could be an incentive for inappropriate allocation of loads and unequal use of resources. A survey on cloud computing models, load balancing & scheduling process is carried out in this paper. By considering the different parameters of the resources, many authors have proposed the solution on load balancing problem. Here, we suggest a new load balancing method (Decider, Threshold based), taking into account various parameters such as RAM, CPU consumption, network traffic statistics. We also concentrate on scheduling at the local and global level for optimal use of computing elements and thus reduce the task's overall execution time. Based on comparative analysis we will assess the efficiency of algorithms / servers.