i-manager's Journal on Cloud Computing (JCC)


Volume 3 Issue 2 February - April 2016

Research Paper

Performance Evaluation for Crud Operations in NosQL Databases

Amandeep Kaur* , Kanwalvir Singh Dhindsa**
* PG Scholar, Department of Computer Science and Engineering, BBSB Engineering College, Fatehgarh Sahib, Punjab, India.
** Professor, Department of Computer Science and Engineering, BBSB Engineering College, Fatehgarh Sahib, Punjab, India.
Kaur, A., and Dhindsa, K. S. (2016). Performance Evaluation for Crud Operations in NosQL Databases. i-manager’s Journal on Cloud Computing, 3(2), 1-9.

Abstract

With the Web growing rapidly and increase in user-generated content websites such as Facebook and Twitter, there is a need for fast databases that can handle huge amounts of data. For this purpose, new database management systems collectively called NoSQL are being developed. There are many NoSQL database types with different performances, and thus it is important to evaluate performance. To check the performance, three major NoSQL databases called MongoDB, Cassandra, and Couchbase have been considered. For performance analysis, different workloads were designed. The evaluation has been done on the basis of read and update operations. This evaluation enables users to choose the most appropriate NoSQL database according to the particular mechanisms and application needs.

Research Paper

Performance Evaluation of Task Scheduling Algorithms for Cloud Computing

Amtoj Kaur* , Kanwalvir Singh Dhindsa**
* PG Scholar, Department of Computer Science and Engineering, BBSB Engineering College, Fatehgarh Sahib, Punjab, India.
** Professor, Department of Computer Science and Engineering, BBSB Engineering College, Fatehgarh Sahib, Punjab, India.
Kaur, A., and Dhindsa, K. S., (2016). Performance Evaluation of Task Scheduling Algorithms for Cloud Computing. i-manager’s Journal on Cloud Computing,3(2), 10-16.

Abstract

Cloud Computing deals with the varied virtualization resources. The task scheduling plays a crucial role to enhance the performance of cloud computing. The issue with task scheduling is distribution of tasks within the system in a way that will optimize the performance of the overall system, minimize the makespan, waiting time, maximize throughput, and so on. The paper highlights the comparison between FCFS, Priority based and Round Robin scheduling algorithms. The priority based and round robin scheduling algorithm have showcased better results under certain parameters than the FCFS.

Research Paper

Providing Security to The User Data in Cloud

Nagaraja J* , M. Purushotham**
* PG Scholar, Department of Computer Science and Engineering, Siddhartha Educational Academy Group of Institutions, Tirupathi, AP, India.
** Assistant Professor, Department of Computer Science and Engineering, Siddhartha Educational Academy Group of Institutions, Tirupathi, AP, India.
Nagaraja, j., and Purushotham, M. (2016). Providing Security to The User Data in Cloud. i-manager’s Journal on Cloud Computing,3(2), 17-24.

Abstract

Cloud computing infrastructure is widely used for deploying client's data in sharing environment. Clients can store and retrieve their data, whenever client needs to access his data, cloud provides the required data efficiently. However, some of the important data might be easily damaged, where the data holder can't store in the cloud unless and until the data privacy and confidentiality is guaranteed. It is nice to provide confidentially during the query processing time and retrieval time. To provide confidentially and efficiency for the query processing, The authors use RC4 algorithm which provides security to users data. The RC4 algorithm produces a pseudo-random key stream that issued to generate the cipher text (by XORing it with the plaintext). With this stream cipher, it can be used for encryption by combining it with the plaintext using bit-wise exclusive-or; translate is performed in the same way.

Research Paper

Improving the Proof of Retrievability in Cloud Computing

ALI AHAMMED DARUBHAIGARI*
PG Scholar, Department of Computer Science and Engineering, JNTUACEA, Andhra Pradesh, India.
Ahammed, D. A. (2016). Improving the Proof of Retrievability in Cloud Computing. i-manager’s Journal on Cloud Computing,3(2), 25-31.

Abstract

Cloud computing provides resource sharing and handling of applications on internet without having local or personal devices. The data integrity is one of the major challenges in cloud computing. The Outsourced Proof of Retrievability (OPoR) system focuses on Cloud Storage Server (CSS) for prevention of routing attacks and malicious operations of servers. In Public verifiability, the security monitoring is taken by Cloud Audit Server (CAS) for reducing overhead on clients. Hence there is a chance that CAS can take miscellaneous operations, so it is needed to strengthen the secure process of both CSS and CAS. This paper strengthens the Proof of Retrievability model (PoR) process and its dynamic data integrity verification on distrusted and outsourced storages on cloud computing. It strengthens the CAS and CSS operations by using third party entities, which generates unique temporary key for each update or modification of the file from user. Generally, this type of OTP key is generated by the server side, hence it is generated by third party Key-Generator entity. The reset attacks of CAS and cloud storage server is secured by a unique temporary key and deleting the local host replica after verifying the uploaded file proof tags, which was send by CAS and CSS, and the cost of memory and process time is reduced using Elliptic curve cryptography. Thus the proposed system, Improving the Proof of Retrievability (IPoR) model will toughen the resistant of retrievability on upload and update of file operations on cloud computing.

Review Paper

Security Threats to Cloud and Corresponding Solutions

D. Raghavaraju*
*Assistant Professor, Department of Computer Science and Engineering, SVIT, Anantapur, India.
Raghavaraju, D. (2016). Security Threats to Cloud and Corresponding Solutions. i-manager’s Journal on Cloud Computing,3(2), 32-36.

Abstract

Distributed computing frameworks speak to a standout amongst the most complex processing frameworks as of now in presence. Current uses of Cloud include broad utilization of disseminated frameworks with shifting level of network and use. With a late concentrate on huge scale expansion of Cloud processing, personality administration in Cloud based frameworks is a basic issue for the maintainability of any Cloud-based administration. This zone has additionally gotten extensive consideration from the exploration group and also the IT business. Diverse calculations and methodology are utilized by the specialists. Still distributed computing security is in its center stage. A few IT organizations are concentrating on cloud security and cloud information security. This paper gives a thought regarding security dangers and arrangements.