An OptiAssign-PSO Based Optimisation for Multi-Objective Multi-Level Multi-Task Scheduling in Cloud Computing Environment
Advanced Analytics for Disease Tracking & Remote Intravenous Injection Monitoring
DevKraft - Fueling Collaboration in Coding Challenges
Comparative Security and Compliance Analysis of Serverless Computing Platforms: AWS Lambda, Azure Functions, and Google Cloud Functions
Blockchain Healthcare Management using Patients
A Comprehensive Review of Security Issues in Cloud Computing
An Extended Min-Min Scheduling Algorithm in Cloud Computing
Data Quality Evaluation Framework for Big Data
An Architectural Framework for Ant Lion Optimization-based Feature Selection Technique for Cloud Intrusion Detection System using Bayesian Classifier
Be Mindful of the Move: A Swot Analysis of Cloud Computing Towards the Democratization of Technology
GridSim Installation and Implementation Process
A Survey on Energy Aware Job Scheduling Algorithms in Cloud Environment
Genetic Algorithm Using MapReduce - A Critical Review
Clustering based Cost Optimized Resource Scheduling Technique in Cloud Computing
Encroachment of Cloud Education for the Present Educational Institutions
Now-a-days Cloud Computing has become more popular in all Information Technology areas. Cloud computing provides a number of services like Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). All these cloud computing models share common resources with different customers to provide services. To provide services to the customers, cloud computing uses a technique called Multitenancy. When cloud uses Multitenancy to provide services, there are so many data and security problems. Cloud security is becoming a major issue in adopting the cloud, where security is considered as one of the major critical concerns for the large customers of cloud. Multitenancy is a technique of sharing resources of cloud commonly across different customers. In SaaS applications, same database is shared by different users. If a common database is shared among different customers, there are chances for so many data related security issues like data loss or leakage, Account or session hijacking, etc., to occur. In this paper, the author has proposed solutions for the problems that occur in cloud computing models with Multitenancy by implementing secure key mechanism using Software Defined Networks (SDN) in the cloud computing service model.
In the current digital technology world, all the applications are moving into cloud environment. The biggest challenge is to maintain the security and privacy of the application in cloud. One of the basic security features that normally applied in any application is Authentication of Users using valid user id and password. Authenticating users only on these two parameters will not assure that the user who had entered these details is an actual user. Recently most of the applications are using two factor authentications (OTP's) over the user id and password. In cloud computing environment we can use different authentication functionalities depending upon the customer requirements. In this paper we will explore eight authentication functionalities and discuss their pros and con's in implementing them in the applications. For strong level of security, two or more functionalities can be combined and implemented in the application to validate the credentials of the user.
Due to the increase of large amount of real world, it is a difficult task for the organizations, companies, etc., to extract relevant data from large amounts of necessary and unnecessary data. Many researches will be going on from the few decades onwards. In datamining there is a concept called clustering which will be used for the smaller datasets, where it effectively makes relevant data into clusters. But the problem will arise on the larger datasets, where it will face a complexity for grouping relevant data into cluster. In this paper, analysis have been referred from many of the algorithms like subscale algorithm for finding the dense region from the dataset and DBscan algorithm for making a cluster as a result it takes dataset as an input and scans a complete dataset. The problem occurs on the time complexity and performance and also, it will follow a sequential flow of database scan. So, it takes time for relevant data values as a cluster in final result. In this analysis, it will allow the complete dataset scans at a time, processing data in parallel manner. So, the resultant data is in effective manner in a lesser time. For the improvement of previous algorithm a Map Red based DBscan for reducing time complexity and performance improvement has been used.
World Wide Web is a huge repository of web pages and links. It provides abudance of information for the Internet users. Web mining is the use of Data mining frameworks to actually discover and concentrate data from web archives and administrations. Web mining is three sorts: Web use Mining, Web content Mining, and Web structure Mining. Web utilization mining is the process of finding information from the cooperation created by the clients in the types of access logs, program logs, intermediary server logs, client session information, treats. A huge amount of user request data is generated in a web log. Predicting user's requests based on previously visited pages is important for the web page recommendation, reduction of latency, and online advertising. The web server log document is naturally made and kept up by a server comprising of a rundown of exercises it performed. The proposed framework is intended for website page forecast in suggestion framework and also it is useful for the investigation of web mining calculation to get incessant consecutive access design from the web log document on the web server. After cleaning, and applying the longest common subsequence and Apriori algorithm, the outcomes of the effective calculation of web log access are inaccurate.
Cloud Computing (CC) is accomplished on the top of Gartner's list of the ten most disruptive technologies of the next years. It has been measured as a significant step towards achieving the long-held dream of envisioning computing as a utility. It provides a great chance to supply storage, processing, and visualization resources for sensing-based healthcare data also. Flexibility, scalability, computing and application resources, optimal utilization of infrastructure and reduced costs are the major cloud-based services. CC comes with abundant possibilities and challenges concurrently of which security / threats is most well-thought out vital barrier for cloud computing path to success. When putting and transmitting data using public networks exposed to the world, cyber attacks in any form are anticipated in CC. Hence, cloud service users need to understand the risk of data breaches and adoption of service delivery model along with cloud deployment model in the cloud environment. This paper covers the roadmap on this machinery in detail so that “robust security application models” can be created / deployed easily with possible uncovered breaches.