An OptiAssign-PSO Based Optimisation for Multi-Objective Multi-Level Multi-Task Scheduling in Cloud Computing Environment
Advanced Analytics for Disease Tracking & Remote Intravenous Injection Monitoring
DevKraft - Fueling Collaboration in Coding Challenges
Comparative Security and Compliance Analysis of Serverless Computing Platforms: AWS Lambda, Azure Functions, and Google Cloud Functions
Blockchain Healthcare Management using Patients
A Comprehensive Review of Security Issues in Cloud Computing
An Extended Min-Min Scheduling Algorithm in Cloud Computing
Data Quality Evaluation Framework for Big Data
An Architectural Framework for Ant Lion Optimization-based Feature Selection Technique for Cloud Intrusion Detection System using Bayesian Classifier
Be Mindful of the Move: A Swot Analysis of Cloud Computing Towards the Democratization of Technology
GridSim Installation and Implementation Process
A Survey on Energy Aware Job Scheduling Algorithms in Cloud Environment
Genetic Algorithm Using MapReduce - A Critical Review
Clustering based Cost Optimized Resource Scheduling Technique in Cloud Computing
Encroachment of Cloud Education for the Present Educational Institutions
Cloud computing is defined as the delivery of on-demand computing resources ranging from infrastructure application to datacenter over the internet on a pay-per-use basis. Most cloud computing applications does not guarantee high level security, such as privacy, confidentiality, and integrity of data because of third-party transition. This brings the development of Blowfish cloud encryption system that enables them to encrypt their data before storage in the cloud. Blowfish encryption scheme is a symmetric block cipher used to encrypt and decrypt data. Microsoft Azure cloud server was used to test the proposed encryption system. Users are able to encrypt their data and obtain a unique identification to help them retrieve encrypted data from the cloud storage facility as and when needed.
For a user who desires to utilize the services of the cloud, security is not negotiable. Cloud Service Providers (CSPs) have security features that help protect user's data and information. These features are however not comprehensive. The Service Level Agreement (SLA) of most CSPs have certain exclusions that warrant users to undertake some measures of security upon themselves, especially for tenants having Virtual Machines (VM) in a multi-tenant architecture. This means that users who are ignorant of the security implications might be exposed to great risks. This paper presents a security model that used the OPNET (Optimized Network Engineering Tools) modeler, based on distributed agents, to prevent attacks from rogue virtual machine and enhance security of VM-to-VM communication. A set of mobile devices were given varying levels of access and pitched against some servers. Observing the packet network delays, phase response time for security apps and the coordination between these mobile devices and the installed agents on the servers showed that data belonging to tenants are safer and attacks from virtual machines are almost negligible.
Cloudlet scheduling seems to be the most fundamental problem of cloud computing as per Infrastructure as a Service (IaaS). Proper scheduling in cloud lead to load balancing, minimization of makespan, and adequate resources utilization. To meet consumers' expectations, the execution of cloudlet simultaneously is required. Many algorithms have been implemented to solve the cloud scheduling problem. This include Min-Min which gave priority to cloudlet with minimum completion time. Min-Min scheduling algorithm has two clear weaknesses; a high value of makespan being generated and low resource utilization. To address these problems, this research proposes an Extended Min-Min Algorithm which assigns cloudlet base on the differences between maximum and minimum execution time of cloudlets. CloudSim was used to implement and compare the performances of the proposed algorithm with the benchmarks. The results of the extensive experiments show that the proposed algorithm is able to perform better in terms of makespan minimization compared to the existing heuristics.
Data is an important asset in all business organizations of today. Thus the results of its poor quality can be very grievous leading to erroneous insights. Therefore, Data Quality (DQ) needs to be evaluated before the analysis of any Big Data (BD). The evaluation of DQ in BD is challenging. Given the enormous datasets that are of varied format fashioned at a rapid speed, it is impossible to use the traditional methods of evaluating DQ in BD. Rather, there is a requirement of strategies and devices for the assessment and evaluation of DQ in BD in a rapid and more efficient manner. However, assessing the quality of data on the whole BD can be very expensive. In addition, there is also a need for improvement in data transformation activities of BD. This paper proposes a framework for DQ evaluation with the application of data sampling technique on BD sets from different data sources reducing the size of the data to samples representing the population of the BD sets. The Bag of Little Bootstrap (BLB) sampling technique will be used. The target Data Quality Dimensions (DQDs) to be used in this paper are completeness, consistency, and accuracy. In addition, the DQDs will be measured using different metric functions relevant to the DQDs. This will be done before and after an improved data transformation techniques to check the improvement of DQ in BD.
Cloud computing has become popular due to its numerous advantages, which include high scalability, flexibility, and low operational cost. It is a technology that gives access to shared pool of resources and services on pay per use and at minimum management effort over the internet. Because of its distributed nature, security has become a great concern to both cloud service provider and cloud users. That is why Cloud Intrusion Detection System (CIDS) has been widely used to the cloud computing setting, which detects and in some cases prevents intrusion. In this paper, the authors have proposed a conceptual framework that detects intrusion attacks within the cloud environment using Ant Lion Optimization (ALO) algorithm for feature selection and Bayesian Classifier. This framework is expected to detect cloud intrusion accurately at low computational cost and reduce false alert rate.