i-manager's Journal on Cloud Computing (JCC)


Volume 2 Issue 1 November - January 2015

Article

Survey on Emerging Technologies for Secure Computations of Big Data

Madhusudhana Nooka Reddy* , C. Naga Raju**
* Associate Professor, Department of Computer Science and Engineering,Syamala Devi Institute of Technology for Women, Andhra Pradesh, India.
** Associate Professor and Head, Department of Computer Science and Engineering, Yogi Vemana University, Andhra Pradesh, India.
Reddy, N. N., and Raju, C. N. (2015). Survey on Emerging Technologies for Secure Computations of Big Data. i-manager’s Journal on Cloud Computing, 2(1), pp. 1-6. https://doi.org/10.26634/jcc.2.1.3300

Abstract

Big data is vast amount of data characterized by volume, velocity and variety. Mining such data can provide comprehensive business intelligence. However, conventional environments are not sufficient to handle and mine such data. Distributed programming frameworks like Hadoop are used to process big data. Such frameworks use a new programming paradigm known as Map Reduce. The challenging issue in big data mining is security implications. This paper explores the merits and demerits of the distributed data mining frameworks such as Hadoop, Haloop, Sailfish and AROM and describes the techniques on how the distributed frameworks for managing and mining big data can help enterprises to make expert decisions. Moreover there is a need for secure computations in distributed programming frameworks. This paper provides useful insights on big data, big data mining and the need for secure computations for processing big data.

Article

Study of Cloud Based Mobile Learning Approaches

S.Vasundara* , D. Venkatesh**, D. Raghavaraju***
* Professor, Department of Computer Science and Engineering, Jawaharlal Nehru Technological University, Anantapuramu, India.
**Associate Professor, Department of Computer Science and Engineering and Information Technology, GATES Institute of technology, Gooty, India.
*** Assistant Professor, Department of Computer Science and Engineering, Sri Venkateswara Institute of Technology, Anantapuramu, India.
Vasundara, S., Venkatesh, D., and Raghavaraju, D. (2015). Study of Cloud Based Mobile Learning Approaches. i-manager’s Journal on Cloud Computing, 2(1), 7-13. https://doi.org/10.26634/jcc.2.1.3301

Abstract

Mobile cloud learning is a blend of portable learning and distributed computing, which is generally a new idea that holds significant guarantee for future improvement and conveyance in the instruction areas. Distributed computing helps versatile learning overcome hindrances identified with portable registering. Versatile learning (m-learning) has been acknowledged as a productive method for learning. With the expanding number of clients, administrations, training substance and assets, notwithstanding, how to send m-learning gets to be hazardous. As a promising innovation to beat the issues in m-learning, Cloud processing gives solid, redid and QoS ensured element registering situations for end-clients. The main aim of this paper is to provide different systems that provide mobile learning in cloud computing. In this study, characteristics and benefits of mobile learning are discussed.

Article

Research Issues in Enterprise Cloud Computing

S. Anandamurugan*
Assistant Professor (SLG), Department of Information Technology, Kongu Engineering College, Erode, Tamil Nadu, India
Anandamurugan, S. (2015). Research Issues in Enterprise Cloud Computing. i-manager’s Journal on Cloud Computing, 2(1), 14-23. https://doi.org/10.26634/jcc.2.1.3302

Abstract

Every technology has a value in it. To speak technically apart from theoretical and research, every technology must be implemented in real time to the human kind and solve all their issues. For every industry, profit is the major goal or a part of the whole business strategy itself. Thus every technology must be industry oriented and supported rather than a research topic every time.[1] Industrial oriented term of cloud computing is called as enterprise cloud computing. The word enterprise cloud computing refers to the business related operations and the usage of cloud computing technology for all their work. The close alignment of business related corporate IT sector and cloud computing has given a new dimension to the term enterprise cloud computing. Today cloud computing has changed the whole work culture in the corporate sector. Things have advanced very fast and have become more reliable. Gone are all the traditional and simple ways in handling all problems and solutions to them. Business related operations and solutions are well handled and managed using advanced remote cloud infrastructure and its unique capabilities. The objective of this paper is to give the overview of research issues in cloud computing

Research Paper

Multi Layer Encryption using Access Control in PublicClouds

K.Nethaji Sundar Sukumar* , L. Venkateswara Reddy**
* PG Scholar, Department of Information Technology, Sree Vidyanikethan Engineering College (Autonomous), Andhra Pradesh, India.
** Professor, Department of Information Technology, Sree Vidyanikethan Engineering College (Autonomous), Andhra Pradesh, India.
Sukumar, K. N. S. S., and Reddy, L. V. (2015). Multi Layer Encryption using Access Control in Public Clouds. i-manager’s Journal on Cloud Computing, 2(1), 24-31. https://doi.org/10.26634/jcc.2.1.3303

Abstract

Nowadays privacy preserving is the challenging issue of public clouds. The data of fine-grained access control are enforced on confidential data hosted into the public clouds of storage. Single layer encryption (SLE) approach is to encrypt the data into public clouds by using encryption algorithm, and two layer encryption (TLE) approach is to encrypt the data before uploading into the clouds on storage. These two approaches are facing the problem of computational cost and communications process of data owner and public clouds. So, these problems are reduced by using new approach of multi layer encryption approach. In this approach, multiple keys are provided for end users and accessing the data from public clouds. So, the authors are using an algorithm known as Attribute Based-Group Key Management (AB-GKM).

Research Paper

Cloud Video Server (CVS): Secure Video Storage on Cloud using Heterogeneous Slaves

D. Kesavaraja* , A.Shenbagavalli**
* Assistant Professor, Department of Computer Science and Engineering, Dr.SivanthiAditanar College of Engineering, Tiruchendur, India.
** Professor & Head, Department of Electronics and Communication Engineering, National Engineering College, Kovilpatti, India.
Kesavaraja, D., and Shenbagavalli, A. (2015). Cloud Video Server (CVS): Secure Video Storage on Cloud using Heterogeneous Slaves. i-manager’s Journal on Cloud Computing, 2(1), 32-41. https://doi.org/10.26634/jcc.2.1.3304

Abstract

In today's fast growing world, everyone needs a secure storage for their important information like personal videos. So the service provider needs an excellent cloud video server with high security. But hackers easily hack any kind of security mechanism. In this paper , the novel tolerant security mechanism is proposed. A server stores all new information in its storage. The Cloud Video Server is acting as a controller of all the slaves. This system has two protocols named Promise Protocol and Review Protocol for monitoring slaves activity. This scheme uses two standard algorithms namely SHA3 (Secure Hash Algorithm -3 ) and Advanced Encryption Standard (AES) for security test. The performance is verified with the help of the metrics like security level, time complexity ,and Quality of Storage. The performance of this system is superior than the other schemes.