i-manager's Journal on Cloud Computing (JCC)


Volume 1 Issue 1 November - January 2014

Article

Cloud Security Requirements

Poonam Rawat* , Neha Rawat**, Shikha singh***, Awantika****
*-**** Students, Govind Ballabh Pant University of Agriculture and Technology, Pantnagar.
Rawat, P., Rawat ,N., Singh, S., and Awantika (2014). Cloud Security Requirements. i-manager’s Journal on Cloud Computing, 1(1), 1-5. https://doi.org/10.26634/jcc.1.1.2797

Abstract

Cloud computing brings new opportunity and challenges for IT industry. Basically, Cloud computing provides you to access your information from anywhere at any time. So, Cloud computing security is a major concern for cloud service providers, developers and also for users who are using this technology everyday. And ensuring cloud security has become a burning topic in IT industry and research era. The goal of this paper is to provide all the cloud security requirements which should be properly understood for giving cloud its full potential. Taking those requirements, cloud service providers will be able to deliver an efficient and secure service on cloud to individual customers and enterprise. This will encourage the adoption of cloud computing not only on small enterprises, but all over the world on large scales also.

Research Paper

Throughput Variant Component Ranking In Dynamic FT Cloud Framework

Sudheshna tupadha* , Shoba Bindu C**
* Department of CSE, JNTUA College of Engineering, Ananthapuram, India
** Associate Professor & Head, Department of CSE, JNTUA College of Engineering, Ananthapuram, India
Sudheshna, T., and Bindu, C. S. (2014). Throughput Variant Component Ranking In Dynamic FT Cloud Framework. i-manager’s Journal on Cloud Computing, 1(1), 6-12. https://doi.org/10.26634/jcc.1.1.2798

Abstract

FTCloud is an emerging cloud paradigm that orchestrates multiple cloud technologies and is becoming the main stream aspect of providing service. As software, Fault Tolerance (FT) mechanisms mask failures earlier to improve reliability. To address this challenge, Zibin Zheng proposed a component ranking framework with fault tolerance named FTCloud to tolerate failures in software. In FTCloud more characteristic factors like throughput and dynamic faulttolerance mechanisms are not implemented. To ensure reliability ' Dynamic FTCloud ' framework mainly concentrates on throughput with random graph model in FTCloud1 while employing response time for services. The FTCloud2 focuses on failure probability of components as extension to the FTCloud. In this paper, dynamic optimal fault-tolerance strategy is implemented in the framework along with the previous algorithm of design diversity techniques .The prospecting results show that tolerating faults of significant components are having enormous improvement with reliability.

Research Paper

Delegated Access Control In Public Clouds Using Two Layer Encryption

Malathi.P*
PG Scholar, Muthayammal College of Engineering, Rasipuram, Nammakkal (DT), Tamilnadu, India.
Malathi, P. (2014). Delegated Access Control in Public Clouds Using Two Layer Encryption. i-manager’s Journal on Cloud Computing, 1(1), 13-18. https://doi.org/10.26634/jcc.1.1.2799

Abstract

A cloud is a collection of terminals and servers that are publicly accessible via the internet. One of the primary uses of cloud computing is data storage. In cloud computing, data is stored in encrypted form to ensure confidentiality. Here the user performs verification during data storage process. So the data owner requires a Third Party Auditor [TPA] for auditing. TPA audits the files stored in the cloud. During the audit process, TPA gets the keys from the data owner and views the data for the auditing. The major drawback here is TPA can modify the owner data. So, the proposed system implements the encrypting data and notification method, so that the TPA views the data in encrypted form. For encrypted data auditing, dynamic Provable Data Possession (PDP) is used. But if a TPA tries to decrypt the owner data, then Provable Of Retrievable (POR) sends the notification to the data owner. Until the owner verifies the notification, the modification will not be committed to the database.

Research Paper

Online Anomaly Based Intrusion Detection System Using Machine Learning

D.P. Gaikwad* , R.C. Thool**
* Assistant Professor, Department of Computer Engineering, All India Shri Shivaji Memorial Society’s College of Engineering, Pune.
** Professor, Head of Department of Information technology, Shri Guru Gobind Singhji Institute of Engineering and Technology, Nanded
Gaikwad, D. P., and Thool, R. C. (2014). Online Anomaly Based Intrusion Detection System Using Machine Learning. i-manager’s Journal on Cloud Computing, 1(1), 19-25. https://doi.org/10.26634/jcc.1.1.2800

Abstract

As the cost of information processing and Internet accessibility falls, organizations are becoming gradually defenceless to potential cyber threats such as network intrusions. So, there exists a need to run secure and safe transactions through the use of Intrusion Detection Systems, authentication, firewall and other hardware and software solutions. The existing Intrusion Detection system abilities to be adapted are very limited. This makes them ineffective for new or unknown attacks detection or to be adapted to an evolutionary environment. Machine learning approaches offer a potential solution to adaptation and correctness problems in Intrusion detection.Some Intrusion Detection systems does not deal with real time high speed networks. The high false positive rate is another issue with existing intrusion detection systems. In this paper, we present the machine learning approach for Intrusion Detection system which helps to reduce the false positive rates and increase the classification accuracy. We are going to train our system using the Real time data set using Naïve Bayes machine learning algorithm. The role of our system is to attempt to trap an adversary's attendance on a compromised network. Our System notices vulnerable packets that are trying to come into the network. We capture live packets and extract only the relevant header features.This improves the accuracy of the proposed system.Finally, using Naïve Based off-line trainer, we were able to achieve 90.2233 percent accuracy using Cross Validation of 10-fold and 76.6812 percent using supplied test dataset while maintaining 0.102 false positive rates.

Review Paper

Techniques To Ensure Data Integrity In Cloud Survey

C.Sasikala* , Shoba Bindu C**
* Lecturer, Department of CSE, JNTUA College of Engineering, Anantapuramu, India.
** Associate Professor & Head, Department of CSE, JNTUA College of Engineering, Anantapuramu, India.
Sasikala, C., and Bindu, C. S. (2014). Techniques to Ensure Data Integrity in Cloud Survey. i-manager’s Journal on Cloud Computing, 1(1), 26-32. https://doi.org/10.26634/jcc.1.1.2802

Abstract

Cloud Storage also known as data storage as a service, is one of the most popular cloud computing services. It allows the clients to release their burden of storing and maintaining the data locally by storing it over the cloud. Cloud storage moves the client's data to large data centers, which are remotely located, on which user does not have any control. If multiple providers cooperatively work together, the availability of resources can be increased. But still clients worry that whether their data is correctly stored and maintained by the cloud providers without intact. Hence, there is need of checking the data periodically for correction purpose which is called data integrity .In this paper we will discuss data integrity techniques that has been proposed so far, along with their pros and cons, like Proof of Retrievability (PoR), Provable Data Possession ( PDP) and a High Availability and Integrity Layer for cloud storage(HAIL).