i-manager's Journal on Cloud Computing (JCC)


Volume 3 Issue 3 May - July 2016

Research Paper

Resolving Multitenancy Issues in Cloud Computing Service Models Using Software Defined Networks

Chinthagunta Mukundha*
*Associate Professor, Department of Information Technology, Sreenidhi Institute of Science and Technology, Ghatakesar, Hyderabad, Telangana, India.
Mukundha, C. (2016). Resolving Multitenancy Issues in Cloud Computing Service Models Using Software Defined Networks. i-manager’s Journal on Cloud Computing, 3(3), 1-8. https://doi.org/10.26634/jcc.3.3.8295

Abstract

Now-a-days Cloud Computing has become more popular in all Information Technology areas. Cloud computing provides a number of services like Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). All these cloud computing models share common resources with different customers to provide services. To provide services to the customers, cloud computing uses a technique called Multitenancy. When cloud uses Multitenancy to provide services, there are so many data and security problems. Cloud security is becoming a major issue in adopting the cloud, where security is considered as one of the major critical concerns for the large customers of cloud. Multitenancy is a technique of sharing resources of cloud commonly across different customers. In SaaS applications, same database is shared by different users. If a common database is shared among different customers, there are chances for so many data related security issues like data loss or leakage, Account or session hijacking, etc., to occur. In this paper, the author has proposed solutions for the problems that occur in cloud computing models with Multitenancy by implementing secure key mechanism using Software Defined Networks (SDN) in the cloud computing service model.

Research Paper

Authenticating users with multiple levels of validations in a secure Cloud Computing Environment

Pranayanath Reddy Anantula* , G. Manoj Someswar**
* Assistant Professor, Department of Computer Science and Engineering, Alliance University, Bangalore, Karnataka, India.
** Director General & Scientist-G, Global Research Academy, Hyderabad, Telangana, India.
Anantula, P. R., and Someswar, G. M. (2016). Resolving Authenticating users with multiple levels of validations in a secure Cloud Computing Environment. i-manager’s Journal on Cloud Computing, 3(3), 9-17. https://doi.org/10.26634/jcc.3.3.8296

Abstract

In the current digital technology world, all the applications are moving into cloud environment. The biggest challenge is to maintain the security and privacy of the application in cloud. One of the basic security features that normally applied in any application is Authentication of Users using valid user id and password. Authenticating users only on these two parameters will not assure that the user who had entered these details is an actual user. Recently most of the applications are using two factor authentications (OTP's) over the user id and password. In cloud computing environment we can use different authentication functionalities depending upon the customer requirements. In this paper we will explore eight authentication functionalities and discuss their pros and con's in implementing them in the applications. For strong level of security, two or more functionalities can be combined and implemented in the application to validate the credentials of the user.

Research Paper

Subspace Clustering on High Dimensional Data

Bhargav* , P. Venkateswarlu Reddy**
* PG Scholar, Department of Computer Science and Engineering, Sree Vidyanikethan Engineering College, Tirupati, India.
** Assistant Professor, Department of Computer Science and Engineering, Sree Vidyanikethan Engineering College, Tirupati, India.
Bhargav, M., and Reddy, P. V. (2016). Subspace Clustering On High Dimensional Data. i-manager’s Journal on Cloud Computing, 3(3), 18-26. https://doi.org/10.26634/jcc.3.3.8297

Abstract

Due to the increase of large amount of real world, it is a difficult task for the organizations, companies, etc., to extract relevant data from large amounts of necessary and unnecessary data. Many researches will be going on from the few decades onwards. In datamining there is a concept called clustering which will be used for the smaller datasets, where it effectively makes relevant data into clusters. But the problem will arise on the larger datasets, where it will face a complexity for grouping relevant data into cluster. In this paper, analysis have been referred from many of the algorithms like subscale algorithm for finding the dense region from the dataset and DBscan algorithm for making a cluster as a result it takes dataset as an input and scans a complete dataset. The problem occurs on the time complexity and performance and also, it will follow a sequential flow of database scan. So, it takes time for relevant data values as a cluster in final result. In this analysis, it will allow the complete dataset scans at a time, processing data in parallel manner. So, the resultant data is in effective manner in a lesser time. For the improvement of previous algorithm a Map Red based DBscan for reducing time complexity and performance improvement has been used.

Research Paper

Page Navigation Prediction Based on Longest Common Subsequence and Apriori Algorithm

Megha Mishra* , Harsha Dubey**, Vishnu Kumar Mishra***
* Senior Assistant Professor, Department of Computer Science & Engineering, Chhattisgarh Swami Vivekanand Technical University, Chhattisgarh, India.
** Research Scholar, Department of Computer Science & Engineering, Chhattisgarh Swami Vivekanand Technical University, Chhattisgarh, India.
*** Associate Professor, Bharti College of Engineering of Technology, Durg, India.
Mishra, M., Dubey, H., and Mishra, V. K. (2016). Page Navigation Prediction Based On Longest Common Subsequence And Apriori Algorithm. i-manager’s Journal on Cloud Computing, 3(3), 27-32. https://doi.org/10.26634/cc.3.3.8298

Abstract

World Wide Web is a huge repository of web pages and links. It provides abudance of information for the Internet users. Web mining is the use of Data mining frameworks to actually discover and concentrate data from web archives and administrations. Web mining is three sorts: Web use Mining, Web content Mining, and Web structure Mining. Web utilization mining is the process of finding information from the cooperation created by the clients in the types of access logs, program logs, intermediary server logs, client session information, treats. A huge amount of user request data is generated in a web log. Predicting user's requests based on previously visited pages is important for the web page recommendation, reduction of latency, and online advertising. The web server log document is naturally made and kept up by a server comprising of a rundown of exercises it performed. The proposed framework is intended for website page forecast in suggestion framework and also it is useful for the investigation of web mining calculation to get incessant consecutive access design from the web log document on the web server. After cleaning, and applying the longest common subsequence and Apriori algorithm, the outcomes of the effective calculation of web log access are inaccurate.

Review Paper

A Review on Disruptive Technology – “Cloud Computing” -Roadmap to Models and Security Threats and Causes

Sabibullah Mohamed Hanifa*
*Associate Professor & Dean, PG & Research Department of Computer Science, Sudharsan College of Arts & Science, Tamilnadu, India.
Hanifa, S. M. (2016). A Review on Disruptive Technology – “Cloud Computing” -Roadmap to Models and Security Threats and Causes. i-manager’s Journal on Cloud Computing, 3(3), 33-39. https://doi.org/10.26634/jcc.3.3.8299

Abstract

Cloud Computing (CC) is accomplished on the top of Gartner's list of the ten most disruptive technologies of the next years. It has been measured as a significant step towards achieving the long-held dream of envisioning computing as a utility. It provides a great chance to supply storage, processing, and visualization resources for sensing-based healthcare data also. Flexibility, scalability, computing and application resources, optimal utilization of infrastructure and reduced costs are the major cloud-based services. CC comes with abundant possibilities and challenges concurrently of which security / threats is most well-thought out vital barrier for cloud computing path to success. When putting and transmitting data using public networks exposed to the world, cyber attacks in any form are anticipated in CC. Hence, cloud service users need to understand the risk of data breaches and adoption of service delivery model along with cloud deployment model in the cloud environment. This paper covers the roadmap on this machinery in detail so that “robust security application models” can be created / deployed easily with possible uncovered breaches.