An OptiAssign-PSO Based Optimisation for Multi-Objective Multi-Level Multi-Task Scheduling in Cloud Computing Environment
Advanced Analytics for Disease Tracking & Remote Intravenous Injection Monitoring
DevKraft - Fueling Collaboration in Coding Challenges
Comparative Security and Compliance Analysis of Serverless Computing Platforms: AWS Lambda, Azure Functions, and Google Cloud Functions
Blockchain Healthcare Management using Patients
A Comprehensive Review of Security Issues in Cloud Computing
An Extended Min-Min Scheduling Algorithm in Cloud Computing
Data Quality Evaluation Framework for Big Data
An Architectural Framework for Ant Lion Optimization-based Feature Selection Technique for Cloud Intrusion Detection System using Bayesian Classifier
Be Mindful of the Move: A Swot Analysis of Cloud Computing Towards the Democratization of Technology
GridSim Installation and Implementation Process
A Survey on Energy Aware Job Scheduling Algorithms in Cloud Environment
Genetic Algorithm Using MapReduce - A Critical Review
Clustering based Cost Optimized Resource Scheduling Technique in Cloud Computing
Encroachment of Cloud Education for the Present Educational Institutions
In this paper, the green credentials and the security in cloud computing is elaborated in a way that covers security issues, concerns and challenges for Data Security in cloud. Cloud computing plays an important role in bringing the users closer to applications. Cloud computing is said to be a main form of modern computing due to its tremendous advantages. But the main cause is about trust. Cloud computing offers the potential to reduce the environmental impact of Information and Communication Technology (ICT), mostly due to its flexibility and scalability. The users trust the cloud and decide to store sensitive data in the cloud, but the cloud does not provide that much security to the users' data. The key security issue with clouds is that the user of the data may not have control over their data and never have any idea about where the data is placed. This paper deals with cloud computing security issues and threats, especially with data confidentiality and privacy issues. The interests of different groups on users' private data, the legal aspects which enable governments and service providers itself to access their users' data and also the technical background on how they can do so, is covered. Finally some feasible remedies are also presented.
In this article, the author presents some information related to Mobile cloud computing and its applications. Mobile Cloud Computing is the combination of cloud computing, mobile computing and wireless networks to bring rich computational resources to mobile users, network operators, as well as cloud computing providers. Mobile cloud computing at its simplest refers to an infrastructure where both the data storage and data processing happen outside of the mobile device. From various studies, the author concludes that mobile cloud computing provides data storage, processing services in clouds at low cost and elastically in an on-demand fashion. It also provides security architecture when mobile devices integrate with cloud. Some of the mobile cloud computing applications are mobile healthcare, mobile commerce, mobile learning, mobile gaming, social networks like twitter and facebook, booking applications for travel and shopping. Cloud services such as guiding their trip, showing maps, recording itinerary, and storing images and video are also in the mobile devices.
Kerberos is an authentication service, which provides security over the network. It assumes that the messages can be read, modified and fabricated by an intruder. It does not provide any security against breaches caused by buggy software or poor passwords. The original design and implementation of Kerberos V1 through V4 was the work of three former Athena Project staff members, Steve Miller of Digital Equipment Corporation and Clifford Neuman along with Jerome Saltzer, Technical Director of Project Athena, and Jeffrey Schiller, MIT Campus Network [1][8][10]. It is designed to provide strong authentication for client/server applications by using secret-key cryptography. The Kerberos protocol uses Data Encryption Standard (DES) so that a client can prove its identity to a server (and vice versa) across an insecure network connection. Authentication is one of the important network security aspects nowadays in internet activity, a more secure application for authentication is fairly useful. Kerberos is an authentication service developed as part of Project Athena at MIT. In this paper, three proposed extensions to integrate public-key cryptography into Kerberos in cross realm are outlined and some basic performance comparisons are made between them and also comments were made on the major security issues related to public-key enhancements introduced to the Kerberos Authentication Protocol trust model. Here the authors have given brief introduction to Kerberos and, public-key cryptography is provided for those unfamiliar with these security systems.
In modern virtualization based compute clouds, applications share the underlying hardware by running in isolated Virtual Machines (VMs). Each VM, during its initial creation, is configured with certain amount of computing resources (such as CPU, memory and I/O). A key factor for achieving economies of scale in a compute cloud is resource provisioning, which refers to allocating resources to VMs to match their workload. Typically, efficient provisioning is achieved by two operations: (1) Static Resource Provisioning: VMs are created with specified size and then consolidated onto a set of physical servers, the VM capacity does not change; and (2) Dynamic Resource Provisioning: VM capacity is dynamically adjusted to match workload fluctuations. In both static and dynamic provisioning, VM sizing is perhaps the most vital step. VM sizing refers to the estimation of the amount of resources that should be allocated to a VM. The objective of VM sizing is to ensure that the VM capacity commensurate with the workload by scheduling. While overbooking wastes costly resources, under-provisioning degrades application performance and may lose customers. In this proposed work, collocated VM provisioning approach is used in which multiple VMs are consolidated and provisioned based on an estimate of their aggregate capacity needs. This work focuses on implementing an autonomic risk-aware overbooking architecture capable of increasing the resource utilization of cloud data centers by accepting more virtual machines than physical available resources. Admission Control and Fuzzy logic functions are used to estimate the associated risk to each overbooking decision.
Nowadays two layer encryption is the process of enforcing fine-grained access control to the cloud. Sensitive information or secret data transferring in to the cloud by using encryption is an important concept. Under this scenario, data owners encrypt the data to the cloud before uploading them and whenever user credential changes, then reencrypting encryption process takes place. Users register to the data owners and data owners are sending the secret keys of registered users. Data owner is communicating with clouds and users. For this, the authors have proposed an approach known as multi layer encryption, which is used to reduce burden of the overhead work at the data owners. So, in this process, the authors use multi layer encryption approach, whereas the data owners perform a coarse-grained and cloud performs a fine-grained encryption. The authors analyzed this process by using KeyGen algorithm and Attribute Based Group Key Management algorithm.