i-manager's Journal on Cloud Computing (JCC)


Volume 1 Issue 4 August - October 2014

Article

A Survey about Green Credential Cloud and its Security

T.Jenitha Arun Rejus*
PG Graduate, Department of Computer Science, Archana Institute of Technology, Krishnagiri, India.
Rejus, T. J. A. R. (2014). A Survey about Green Credential Cloud and its Security. i-manager’s Journal on Cloud Computing, 1(4), 1-10. https://doi.org/10.26634/jcc.1.4.3189

Abstract

In this paper, the green credentials and the security in cloud computing is elaborated in a way that covers security issues, concerns and challenges for Data Security in cloud. Cloud computing plays an important role in bringing the users closer to applications. Cloud computing is said to be a main form of modern computing due to its tremendous advantages. But the main cause is about trust. Cloud computing offers the potential to reduce the environmental impact of Information and Communication Technology (ICT), mostly due to its flexibility and scalability. The users trust the cloud and decide to store sensitive data in the cloud, but the cloud does not provide that much security to the users' data. The key security issue with clouds is that the user of the data may not have control over their data and never have any idea about where the data is placed. This paper deals with cloud computing security issues and threats, especially with data confidentiality and privacy issues. The interests of different groups on users' private data, the legal aspects which enable governments and service providers itself to access their users' data and also the technical background on how they can do so, is covered. Finally some feasible remedies are also presented.

Article

An Overture of Mobile Cloud Computing and its Applications

D. R. Robert Joan*
Assistant Professor, Mathematics Education, Christian College of Education, Marthandam, Tamil Nadu, India.
Joan, D. R. R. (2014). An Overture of Mobile Cloud Computing and its Applications. i-manager’s Journal on Cloud Computing, 1(4), 11-18. https://doi.org/10.26634/jcc.1.4.3190

Abstract

In this article, the author presents some information related to Mobile cloud computing and its applications. Mobile Cloud Computing is the combination of cloud computing, mobile computing and wireless networks to bring rich computational resources to mobile users, network operators, as well as cloud computing providers. Mobile cloud computing at its simplest refers to an infrastructure where both the data storage and data processing happen outside of the mobile device. From various studies, the author concludes that mobile cloud computing provides data storage, processing services in clouds at low cost and elastically in an on-demand fashion. It also provides security architecture when mobile devices integrate with cloud. Some of the mobile cloud computing applications are mobile healthcare, mobile commerce, mobile learning, mobile gaming, social networks like twitter and facebook, booking applications for travel and shopping. Cloud services such as guiding their trip, showing maps, recording itinerary, and storing images and video are also in the mobile devices.

Article

Risk Assessment Mitigation of Kerberos Protocol Using Public Key Cryptography

M.Muni Babu* , K.V.Siva Prasad Reddy**
*-** Lecturer, Department of Computer Science and Engineering, Jawarhalal Nehru Technological University, Andhra Pradesh, India.
Babu, M. M., and Reddy, K. V. S. P. (2014). Risk Assessment Mitigation of Kerberos Protocol Using Public Key Cryptography. i-manager’s Journal on Cloud Computing,1(4), 19-23. https://doi.org/10.26634/jcc.1.4.3191

Abstract

Kerberos is an authentication service, which provides security over the network. It assumes that the messages can be read, modified and fabricated by an intruder. It does not provide any security against breaches caused by buggy software or poor passwords. The original design and implementation of Kerberos V1 through V4 was the work of three former Athena Project staff members, Steve Miller of Digital Equipment Corporation and Clifford Neuman along with Jerome Saltzer, Technical Director of Project Athena, and Jeffrey Schiller, MIT Campus Network [1][8][10]. It is designed to provide strong authentication for client/server applications by using secret-key cryptography. The Kerberos protocol uses Data Encryption Standard (DES) so that a client can prove its identity to a server (and vice versa) across an insecure network connection. Authentication is one of the important network security aspects nowadays in internet activity, a more secure application for authentication is fairly useful. Kerberos is an authentication service developed as part of Project Athena at MIT. In this paper, three proposed extensions to integrate public-key cryptography into Kerberos in cross realm are outlined and some basic performance comparisons are made between them and also comments were made on the major security issues related to public-key enhancements introduced to the Kerberos Authentication Protocol trust model. Here the authors have given brief introduction to Kerberos and, public-key cryptography is provided for those unfamiliar with these security systems.

Research Paper

Managing Overloaded Mechanisms in VM EnvironmentsUsing MVMOD Algorithm

V.Subasri* , M.Thasnima Nasreen**, M.Kavitha***, C.Divya****, N.Rajganesh*****
*-**** Final Year Students, B.Tech Information Technology, A.V.C College of Engineering, Tamilnadu, India.
***** Assistant Professor [SL], Department of Information Technology, A.V.C College of Engineering, Tamilnadu, India
Subasri, V., Nasreen, M, T., Kavitha, M., Divya, C., and Rajganesh, N. (2014). Managing Overloaded Mechanisms in VM Environments Using MVMOD Algorithm. i-manager’s Journal on Cloud Computing,1(4), 24-29. https://doi.org/10.26634/jcc.1.4.3192

Abstract

In modern virtualization based compute clouds, applications share the underlying hardware by running in isolated Virtual Machines (VMs). Each VM, during its initial creation, is configured with certain amount of computing resources (such as CPU, memory and I/O). A key factor for achieving economies of scale in a compute cloud is resource provisioning, which refers to allocating resources to VMs to match their workload. Typically, efficient provisioning is achieved by two operations: (1) Static Resource Provisioning: VMs are created with specified size and then consolidated onto a set of physical servers, the VM capacity does not change; and (2) Dynamic Resource Provisioning: VM capacity is dynamically adjusted to match workload fluctuations. In both static and dynamic provisioning, VM sizing is perhaps the most vital step. VM sizing refers to the estimation of the amount of resources that should be allocated to a VM. The objective of VM sizing is to ensure that the VM capacity commensurate with the workload by scheduling. While overbooking wastes costly resources, under-provisioning degrades application performance and may lose customers. In this proposed work, collocated VM provisioning approach is used in which multiple VMs are consolidated and provisioned based on an estimate of their aggregate capacity needs. This work focuses on implementing an autonomic risk-aware overbooking architecture capable of increasing the resource utilization of cloud data centers by accepting more virtual machines than physical available resources. Admission Control and Fuzzy logic functions are used to estimate the associated risk to each overbooking decision.

Research Paper

Multi Layer Encryption Approach to Secure Data and Fine-Grained Access Control in Public Clouds

K.Nethaji Sundar Sukumar* , L. Venkateswara Reddy**
* PG Scholar, Department of Information Technology, Sree Vidyanikethan Engineering College (Autonomous), Andhra Pradesh, India.
** Professor, Department of Information Technology, Sree Vidyanikethan Engineering College (Autonomous), Andhra Pradesh, India.
K.Nethaji Sundar Sukumar and L.Venkateswara Reddy (2014). Multi Layer Encryption Approach to Secure Data and Fine-Grained Access Control in Public Clouds. i-manager’s Journal on Cloud Computing, 1(4), pp.30-35. https://doi.org/10.26634/jcc.1.4.3193

Abstract

Nowadays two layer encryption is the process of enforcing fine-grained access control to the cloud. Sensitive information or secret data transferring in to the cloud by using encryption is an important concept. Under this scenario, data owners encrypt the data to the cloud before uploading them and whenever user credential changes, then reencrypting encryption process takes place. Users register to the data owners and data owners are sending the secret keys of registered users. Data owner is communicating with clouds and users. For this, the authors have proposed an approach known as multi layer encryption, which is used to reduce burden of the overhead work at the data owners. So, in this process, the authors use multi layer encryption approach, whereas the data owners perform a coarse-grained and cloud performs a fine-grained encryption. The authors analyzed this process by using KeyGen algorithm and Attribute Based Group Key Management algorithm.