i-manager's Journal on Cloud Computing (JCC)


Volume 1 Issue 2 February - April 2014

Article

Cloud Computing: Security and Applications

Awantika* , Neha Rawat**, Poonam Rawat***, Shikha singh****
*-**** Govind Battabh Pant University of Agriculture and Technology, Patnagar, Uttarakhand.
Awantika, Rawat, N., Rawat, P., and Singh, S., (2014). Cloud Computing: Security and Applications. i-manager’s Journal on Cloud Computing, 1(2), 1-6. https://doi.org/10.26634/jcc.1.2.3045

Abstract

Cloud computing is becoming a fundamental part of Information Technology. Resource sharing is a pure plug and play model that effectively simplifies infrastructure planning. This is the aim of cloud computing. The two key advantages of this model are ease- of-use and cost-effectiveness. This paper explores some of the basics of cloud computing along with its security and application concerns. The paper also aims to provide the means for understanding the model and exploring options available for complementing your technology and infrastructure needs.

Article

Basic Information about Cloud Computing Related to Modern Situation

D. R. Robert Joan*
Assistant Professor of Mathematics, Christian College of Education, Marthandam, India.
Joan, R. (2014).Basic Information about Cloud Computing Related to Modern Situation. i-manager’s Journal on Cloud Computing, 1(2), 7-12. https://doi.org/10.26634/jcc.1.2.3051

Abstract

Modern computing in the age of the Internet is quite a strange, remarkable thing. Cloud Computing is a technology that uses the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. This technology allows for much more efficient computing by centralizing data storage, processing and bandwidth. In cloud computing, the word cloud (also phrased as "the cloud") is used as a metaphor for "the Internet," so the phrase cloud computing means "a type of Internet-based computing," where different services such as servers, storage and applications are delivered to an organization's computers and devices through the Internet. Cloud computing is comparable to grid computing, a type of computing where unused processing cycles of all computers in a network are harnessed to solve problems too intensive for any stand-alone machine. Cloud computing is a general term for anything that involves delivering hosted services over the Internet. These services are broadly divided into three categories: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). A cloud can be private or public. A public cloud sells services to anyone on the Internet. A private cloud is a proprietary network or a data center that supplies hosted services to a limited number of people. Thus the author discussed the outline of Cloud computing in this article.

Review Paper

A Survey on Ensuring Data Confidentiality in Cloud Computing

Dileep Kumar Reddy P* , R. Praveen Sam**, Shoba Bindu C***
* Lecturer, Department of Computer Science and Engineering, Jawaharlal Nehru Technological University, Anantapuramu, India.
** Professor, Department of Computer Science and Engineering, G.P.R.E.C, Kurnool, India.
*** Associate professor, Department of Computer Science and Engineering, Jawaharlal Nehru Technological University, Anantapuramu,
Reddy, P D. K., Sam, R. P. and Bindu, C. S. (2014). A Survey on Ensuring Data Confidentiality in Cloud Computing. i-manager’s Journal on Cloud Computing, 1(2), 13-19. https://doi.org/10.26634/jcc.1.2.3052

Abstract

There is one internet technology that is growing very fast, that is nothing but cloud computing, which facilitates users to use resources without help of installation of any software. Cloud computing provides some information storage with its services. One of the challenges in the current research in cloud computing is Data confidentiality. User's private data is stored in third service party providers, who do operations on this data. So the risk of exposure of user's private data is high. Previous solutions to save the information mainly rely on cryptographic approaches. This paper gives information regarding some previous approaches to keep protection of the confidentiality of users.

Research Paper

P2P Cloud: Peer-to-Peer Based Security Aware CloudStorage Architecture

lalitha.B* , A.V.L.N.Sujith**
* Assistant professor, Department of Computer Science and Engineering, Jawaharlal Nehru Technological University, Anantapur, India
** Lecturer, Department of Computer Science and Engineering, Jawaharlal Nehru Technological University, Anantapur, India.
Lalitha, B., and Sujith, A. V. L. N. (2014). P2p Cloud: Peer-to-Peer Based Security Aware Cloud Storage Architecture . i-manager’s Journal on Cloud Computing, 1(2), 20-24. https://doi.org/10.26634/jcc.1.2.3053

Abstract

Cloud computing is most popular for its ubiquitous behavior, because the users can access the resources irrespective of their location and time. Even though it is cost effective, flexible and efficient platform for delivering services, deployment of cloud computing in real-time business environment brings out substantial security issues in handling essential data. It is very difficult to provide security, maintain privacy and update service availability in cloud, because they outsource their services frequently to a third party. Clouds can be safeguarded by securing virtualized data center resources, preserving data integrity and maintaining user privacy. Thereby, secured and efficient methods are required to address confidentiality and integrity of the outsourced data on untrusted cloud servers. In this paper, the authors propose a Peerto- Peer based cloud architecture to secure resources in virtualized data centers and implementation of a secured protocol based on cryptographic and random sampling techniques for data integrity in cloud

Research Paper

Privacy Preserving Data Integrity Verification in Cloud

T.Subha* , S. Jayashri**
* Research Scholar, Anna University, Chennai
** Director-Research, Adhiparasakthi Engineering College, Chennnai.
Subha, T., and Jayashri, S. (2014). Privacy Preserving Data Integrity Verification in Cloud. i-manager’s Journal on Cloud Computing, 1(2), 25-31. https://doi.org/10.26634/jcc.1.2.3054

Abstract

Cloud computing enables industries to outsource their IT services at a lower cost. It reduces the capital expenditure of the industry and maintenance. Clients upload their data to the storage server in cloud storage service. Ensuring the integrity and confidentiality of the data stored at cloud it is of great importance since the data is stored and maintained by third party. In prior works, the clients need to store the data locally to verify the proofs sent by the server. In this paper, we propose a secure and dependable cloud storage service with data forwarding scheme among the cloud users. It involves TTPA (Trusted Third Party Auditor) who audit the data in cloud server on behalf of the clients. The auditing scheme achieves privacy preserving by not letting the auditor or any adversary to collect information about the client's data. Our approach is provable to be secure and efficient. It works for all Text, Video, Image files and supports dynamic data operations (insert, update, delete) also.