International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015.

Size: px
Start display at page:

Download "International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015."

Transcription

1 Survey On Cloud Computing For Mobile Users Using Machine Servers Ms. Deepali Gothawal 1, Deepali Patil 2, Sneha Chavan 3, Tejaswini Chandekar 4, Rohit Koti 5 Department of Computer Engineering, DYPCOE, Savitribai Phule University of Pune, Maharashtra, India 1, 2, 3, 4, 5 A B S T R A C T Mobile devices are replacing laptops and traditional computers. These devices are used not just for communication but also for multimedia applications such as watching videos, listening to music and playing games. This limits the storage space available on these devices which decides how much multimedia files can be used on the device. User can make the space for adding new files by constantly removing existing files. Addition of extra storage space either by increasing internal storage by manufacturers or addition of Secure Digital (SD) cards only serves to temporarily alleviate the problem until we run out of space again. For this reason various good techniques are proposed and already taken into practice. Integration to cloud based storage elegantly solves this problem. So we use the concept of Cloud Based File System Application which consists of Cloud Server application and Mobile Device Client application. Cloud computing is a concept of virtual device for storing multimedia files. Storage of these files securely and using whenever needed is main idea of Cloud computing. This cloud computing technique is taken into practice for mobile devices. Mobile cloud computing (MCC) is a combination of mobile computing and cloud computing which refers to an infrastructure where both the data storage and processing of data is done outside of the mobile device. In Mobile cloud computing, using cloud computing technology mobile applications are powered, build and hosted. Mobile cloud applications move the data stored on mobile devises onto the powerful and centralized computing platforms located in clouds, which are then accessed using the internet connection. Mobile cloud computing is similar to the cloud computing, only in the client side there is a mobile phones, still the main concept behind MCC is cloud computing. Index Terms : SD, Cloud Based File System Application, MCC, Cloud Computing, Multimedia Files. I. INTRODUCTION Cloud computing is a new paradigm in which computing resources such as processing, memory, and storage are not physically present at the user s location. Instead, a service provider owns and manages these resources, and users access them via the Internet [1]. For example, Amazon Web Services lets users store personal data via its Simple Storage Service (S3) and perform computations on stored data using the Elastic Compute Cloud (EC2). This type of computing provides many advantages for businesses including low initial capital investment, shorter start-up time for new services, lower maintenance and operation costs that make cloud computing an attractive option. Reports suggest that there are several benefits in shifting computing from the desktop to the cloud [2][3]. The primary constraints for mobile cloud computing are limited energy and wireless bandwidth. Cloud computing can provide energy savings as a service to mobile users, though it also poses some unique challenges. A survey last year by Change Wave Research revealed short battery life to be the most disliked characteristic of Apple s iphone 3GS, while a 2009 Nokia poll showed that battery life was the , IJAFRC and NCRTIT 2015 All Rights Reserved

2 top concern of music phone users. Many applications are too computation intensive to perform on a mobile system. There are four different deployment cloud models which are operated such as: 1) Public Cloud 2) Private Cloud 3) Community Cloud 4) Hybrid Cloud. Our main focus is we use Public Cloud to Store the data and provide security algorithm to secure that data. Fig below shows different models and its features along with the uses. Figure 1. Deployment models operated by Cloud Computing II. LITERATURE SURVEY There are some existing system of cloud based file system applications. These system have features like file upload, file modify, file sharing. These methods can be used as an alternative to expand the mobile device storage on cloud. The study of these application shows that none of the application is able to provide best performance under uncontrolled circumstances such as data reliability, performance and data security. Following are the systems. 1. Dropbox: The Dropbox offers one also some options for dealing with files that had been on almost any system. On the one hand, it is also older versions of a document to restore. On the other hand, you can share certain data in the Dropbox for non-registered users, for example to enable a particular document continues without immediately using an FTP server, or the like. Once installed, the client runs in the background and the sync process runs automatically. There are no traffic limits. Users do not have opportunity to upload their own data with encryption. The encryption code the drop box is used, initially known only to the developers. This means that no third party shall have easy access to the data. Like most providers of online storage to keep the Dropbox developers the right to delete data from inactive free accounts. 2. Google Drive: Google Drive is a file storage and synchronization service provided by Google which enables user cloud storage, file sharing and collaborative editing. One can store documents, photos, music, videos etc. all in one place. It syncs with your mobile devices and computer, so if change are made from one gadget, it will automatically show up if you were to access it elsewhere. This service liberates user from the use of a variety of software so as to open different file formats. One of the , IJAFRC and NCRTIT 2015 All Rights Reserved

3 disadvantages that might happen will be the hackers, who hack or remove important data, or they install virus into the server and files are gone. 3. Box: Box is a cloud computing business which provides file-sharing, collaborating, and other tools for working with files that are uploaded to its servers. Users can determine how their content can be shared with other users. Users may invite others to view and/or edit an account's shared files, upload documents and photos to a shared files folder and give other users rights to view shared files. Box is a service with diverse potential. It doesn t just synchronize and backup data, it helps to manage and share data too. While Box is a well-rounded storage solution, it syncs to only one specific file on the user's computer, a catchall folder for the user's Box files. So, it requires some group planning and practice to use properly. 4. SkyDrive: SkyDrive is just one of the many features offered by our new through Microsoft. Even better, it allows access those documents anywhere through an Internet connection. This enables to make a secure backup of important documents, assignments, or photos. Users can edit documents in Word and pick up where they left off in the online app. Users can also remotely access files stored on their PC from anywhere. In SkyDrive there is a lack of sophisticated admin tools, such as document permissions and password-protected files. III. PROPOSED SYSTEM Cloud computing is a new generation technology which makes computing power universally available and provides cloud utilities in resources utilization. Using the mobile cloud computing app user can extend the storage of mobile devices with simple and easy to use user interface and also provides the reliability of data. It allows user to configure laptop or PC as a cloud server and get access to it using this app. User can get access to the files stored in the cloud by which user can read, open, edit the currently opening file and store file back anytime/anywhere from the mobile devices. Files which are stored in mobile for a long period of time gets deleted automatically from mobile and is stored on cloud. A service provider owns and manages resources (such as processing, memory, storage), and users access them via the Internet Simple Storage Service (S3): let users store personal data Elastic Compute Cloud (EC2): perform computations on stored data There are several benefits in shifting computing from the desktop to the cloud. The primary constraints for mobile computing are limited energy and wireless bandwidth. The system has low initial capital investment, shorter start-up time for new services, lower maintenance and operation costs, higher utilization through virtualization, easier disaster recovery. IV. ALGORITHM RSA is widely used Public-Key algorithm. It stands for Ron Rivest, Adi Shamir and Len Adleman, who first described this algorithm in We are using this algorithm to provide the security to data stored in cloud. It encrypts the data so only concerned user can access. So by using this unauthorized users can t access the data , IJAFRC and NCRTIT 2015 All Rights Reserved

4 User data is encrypted first and then stored in cloud. When user wants to access the data, the user has to request the data. To provide the requested data to user the cloud provider authenticates the user and delivers the data. RSA is a block cipher, in which every message is mapped to an integer. RSA consists of Public-Key and Private-Key. In our Cloud environment, Pubic-Key is known to all, whereas Private-Key is known only to the user who originally owns the data. Thus, encryption is done by the Cloud service provider and decryption is done by the Cloud user or consumer. Once the data is encrypted with the Public-Key, it can be decrypted with the corresponding Private-Key only. RSA algorithm involves three steps: 1. Key Generation 2. Encryption 3. Decryption Key Generation Before the data is encrypted, Key generation should be done. This process is done between the Cloud service provider and the user. Encryption Encryption is the process of converting original plain text (data) into cipher text (data). Decryption Decryption is the process of converting the cipher text (data) to the original plain text (data). V. CONCLUSION As mobile devices have become our primary data processing devices nowadays, mobile cloud computing has emerged as a great extension to cloud computing field. Mobile Cloud offers data storage and processing capabilities to the resource limited mobile users which makes it very potential technology in near future. In this paper, we proposed a mobile app which offers the maximum utilization of cloud for storing data instead of storing in SD-card which also provides the security, reliability, flexibility, privacy for the data stored in the cloud. User can access the data stored in the cloud through internet anywhere/anytime. VI. REFERENCES [1] Karthik Kumar And Yung-Hsiang Lu, Purdue University, Cloud Computing For Mobile Users: Can Offloading Computation Save Energy? IEEE Transactions On Cloud Computing Year [2] M. Creeger, CTO Roundtable: Cloud Computing1, ACM Queue, June 2009, Pp Google Tech Talk, Away With Applications: The Death Of The Desktop 4 May , IJAFRC and NCRTIT 2015 All Rights Reserved

5 [3] H. T. Dinh, C. Lee, D. Niyato And P. Wang, "A Survey Of Mobile Cloud Computing: Architecture, Applications, And Approaches", Wireless Communications And Mobile Computing - Wiley, (2011) October. [4] Abid Shahzad And Mureed Hussain, Security Issues And Challenges Of Mobile Cloud Computing International Journal Of Grid And Distributed Computing Vol.6, No.6 (2013), Pp [5] Cloud Computing Usability In Mobile Communication Network, Mridul S. Kumar, Thomas Kuruthukulangara & Fousiya K. K Assistant Professor, Department of Computer Science and Engineering, Jyothi Engineering College, Cheruthuruthy, Thrissur, Kerala, India [6] M. Al Morsy, J. Grundy and I. Müller, "An Analysis of The Cloud Computing Security Problem", In Proceedings of APSEC 2010 Cloud Workshop, Sydney, Australia, (2010), November 30. [7] Soeung-Kon, J. -H. Lee and S. W. Kim, "Mobile Cloud Computing Security Considerations", Journal of Security Engineering, no. 9, (2012) April. [8] K. Opovi and Z. Hocenski, "Cloud computing security issues and challenges", MIPRO, 2010 Proceedings of the 33rd International Convention, (2010) May [9] D. Chen and H. Zhao, "Data Security and Privacy Protection Issues in Cloud Computing", International Conference on Computer Science and Electronics Engineering (ICCSEE), (2012) March [10] Morshed, M. S. Jahan, M. M. Islam, M. K. Huq, M. S. Hossain and M. A. Basher, "Integration of Wireless Hand-Held Devices with the Cloud Architecture: Security and Privacy Issues", International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), (2011) October. [11] D. Popa, M. Cremene, M. Borda and K. Boudaoud, "A security framework for mobile cloud applications", 11th Roedunet International Conference (roedunet), (2013) January [12] M. R. Prasad, J. Gyani and P. R. K. Murti, "Mobile Cloud Computing: Implications and Challenges", Journal of Information Engineering and Applications, vol. 2, no. 7, (2012) , IJAFRC and NCRTIT 2015 All Rights Reserved

Security Issues and Challenges of Mobile Cloud Computing

Security Issues and Challenges of Mobile Cloud Computing , pp.37-50 http://dx.doi.org/10.14257/ijgdc.2013.6.6.04 Security Issues and Challenges of Mobile Cloud Computing Abid Shahzad 1 and Mureed Hussain 2 Faculty of Computing, Shaheed Zulfikar Ali Bhutto Institute

More information

CLOUD COMPUTING USABILITY IN MOBILE COMMUNICATION NETWORK

CLOUD COMPUTING USABILITY IN MOBILE COMMUNICATION NETWORK BEST: International Journal of Management, Information Technology and Engineering (BEST: IJMITE) ISSN 2348-0513 Vol. 2, Issue 3, Mar 2014, 105-110 BEST Journals CLOUD COMPUTING USABILITY IN MOBILE COMMUNICATION

More information

perform computations on stored data (Elastic Compute Cloud (EC2). )

perform computations on stored data (Elastic Compute Cloud (EC2). ) Karthik Kumar and Yung-Hsiang Lu, Purdue University Presenter Yifei Sun Take Amazon cloud for example. store personal data (Simple Storage Service (S3) ) perform computations on stored data (Elastic Compute

More information

CLOUD COMPUTING FOR MOBILE USERS: CAN OFFLOADING COMPUTATION SAVE ENERGY?

CLOUD COMPUTING FOR MOBILE USERS: CAN OFFLOADING COMPUTATION SAVE ENERGY? CLOUD COMPUTING FOR MOBILE USERS: CAN OFFLOADING COMPUTATION SAVE ENERGY? Appears in: 2010, Computer, IEEE Computer Society Authors: Karthik Kumar and Yung-Hsiang Lu Electrical and Computer Engineering,

More information

Mobile Hybrid Cloud Computing Issues and Solutions

Mobile Hybrid Cloud Computing Issues and Solutions , pp.341-345 http://dx.doi.org/10.14257/astl.2013.29.72 Mobile Hybrid Cloud Computing Issues and Solutions Yvette E. Gelogo *1 and Haeng-Kon Kim 1 1 School of Information Technology, Catholic University

More information

A Comparative Study of cloud and mcloud Computing

A Comparative Study of cloud and mcloud Computing A Comparative Study of cloud and mcloud Computing Ms.S.Gowri* Ms.S.Latha* Ms.A.Nirmala Devi* * Department of Computer Science, K.S.Rangasamy College of Arts and Science, Tiruchengode. s.gowri@ksrcas.edu

More information

An Intelligent Approach for Data Fortification in Cloud Computing

An Intelligent Approach for Data Fortification in Cloud Computing An Intelligent Approach for Data Fortification in Cloud Computing Supriya Mandhare 1, Prof. A. K. Sen 2, Asso. Prof. Rajkumar Shende 3 1,3 Department of Computer Engineering, St. Francis Institute of Technology,

More information

The Genealogy Cloud: Which Online Storage Program is Right For You Page 1 2012, copyright High-Definition Genealogy. All rights reserved.

The Genealogy Cloud: Which Online Storage Program is Right For You Page 1 2012, copyright High-Definition Genealogy. All rights reserved. The Genealogy Cloud: Which Online Storage Program is Right For You Thomas MacEntee, of High-Definition Genealogy http://hidefgen.com hidefgen@gmail.com Clouds in Genealogy? What is the Genealogy Cloud?

More information

Cloud SQL Security. Swati Srivastava 1 and Meenu 2. Engineering College., Gorakhpur, U.P. Gorakhpur, U.P. Abstract

Cloud SQL Security. Swati Srivastava 1 and Meenu 2. Engineering College., Gorakhpur, U.P. Gorakhpur, U.P. Abstract International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 5 (2014), pp. 479-484 International Research Publications House http://www. irphouse.com /ijict.htm Cloud

More information

Introduction to Cloud Storage GOOGLE DRIVE

Introduction to Cloud Storage GOOGLE DRIVE Introduction to Cloud Storage What is Cloud Storage? Cloud computing is one method to store and access data over the internet instead of using a physical hard drive (e.g. computer s hard drive, flash drive,

More information

Cloud Computing Overview

Cloud Computing Overview Cloud Computing Overview Presented by: Luis Ledezma, SMP Tech, Inc. Cloud Computing Overview 2 Defining Cloud Computing Definition Characteristics Layers / Service Models Deployment Schemes Business Drivers

More information

The Cloud Issue 1 Page 1

The Cloud Issue 1 Page 1 The Cloud Issue 1 Page 1 Fo C : t s a r ec!!! y d t hing! d u o o lo ag ha Yes, t t's What is "The Cloud"? According to WikiPedia, it's: With technology trends moving towards cloud based computing and

More information

MEMORY IN THE CLOUD THE CLOUD STORAGE SERVICE

MEMORY IN THE CLOUD THE CLOUD STORAGE SERVICE MEMORY IN THE CLOUD THE CLOUD STORAGE SERVICE Nigro Antonio Ambus Giuliano Perugia, 14 Luglio 2012 Agenda 1 2 3 4 What is Cloud Computing? Memory on the Cloud : DAAS or Cloud Storage Principal vendors

More information

activecho Driving Secure Enterprise File Sharing and Syncing

activecho Driving Secure Enterprise File Sharing and Syncing activecho Driving Secure Enterprise File Sharing and Syncing activecho Overview In today s enterprise workplace, employees are increasingly demanding mobile and collaborative solutions in order to get

More information

Chapter 19 Cloud Computing for Multimedia Services

Chapter 19 Cloud Computing for Multimedia Services Chapter 19 Cloud Computing for Multimedia Services 19.1 Cloud Computing Overview 19.2 Multimedia Cloud Computing 19.3 Cloud-Assisted Media Sharing 19.4 Computation Offloading for Multimedia Services 19.5

More information

Optimized Offloading Services in Cloud Computing Infrastructure

Optimized Offloading Services in Cloud Computing Infrastructure Optimized Offloading Services in Cloud Computing Infrastructure 1 Dasari Anil Kumar, 2 J.Srinivas Rao 1 Dept. of CSE, Nova College of Engineerng & Technology,Vijayawada,AP,India. 2 Professor, Nova College

More information

Performance Analysis of Client Side Encryption Tools

Performance Analysis of Client Side Encryption Tools Performance Analysis of Client Side Encryption Tools Subrata Kumar Das 1, Md. Alam Hossain 2, Md. Arifuzzaman Sardar 3, Ramen Kumar Biswas 4, Prolath Dev Nath 5 Abstract Client side encryption tools are

More information

Security in Offloading Computations in Mobile Systems Using Cloud Computing

Security in Offloading Computations in Mobile Systems Using Cloud Computing Security in Offloading Computations in Mobile Systems Using Cloud Computing S.Masiperiyannan 1,C.M.Mehathaf Begum 2,I.Mohammed Farook Ali 3,G.Mayuri Priya 4,S.Sudhakar 5 UG Student, Dept. of CSE, K S R

More information

About me & Submission details

About me & Submission details About me & Submission details Parveen Yadav Security Researcher aka Ethical Hacker. Working as a Freelancer. White Hat Hacking work. Few Recognitions :- Got listed my name in Google Hall of fame,amazon,paypal,adobe

More information

Security Analysis of Cloud Computing: A Survey

Security Analysis of Cloud Computing: A Survey Security Analysis of Cloud Computing: A Survey Kamaljeet Pakhre 1, Navdeep Singh 2, Sanket Mani Tiwari 3 1,2,3 Research Scholar, M. Tech. (CSE), Galgotias University, Greater Noida, India. Abstract Now

More information

Preamble: Remote Storage in Android Using SCTP

Preamble: Remote Storage in Android Using SCTP Preamble: Remote Storage in Android Using SCTP Mr. Nikhil Vijay Patil 1, Prof.Sandeep Khanna 2 1 M.E.Second Year Student, Padm.Dr.V.B.Kolte College of Engineering, Malkapur Dist.Buldhana (M.S.) India.

More information

Cloud computing an insight

Cloud computing an insight Cloud computing an insight Overview IT infrastructure is changing according the fast-paced world s needs. People in the world want to stay connected with Work / Family-Friends. The data needs to be available

More information

Investigation of Cloud Computing: Applications and Challenges

Investigation of Cloud Computing: Applications and Challenges Investigation of Cloud Computing: Applications and Challenges Amid Khatibi Bardsiri Anis Vosoogh Fatemeh Ahoojoosh Research Branch, Islamic Azad University, Sirjan, Iran Research Branch, Islamic Azad University,

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON MOBILE APPLICATION IN A CLOUD COMPUTING SECURE AND SCALABLE USING CLOUD

More information

Cloud Computing for hand-held Devices:Enhancing Smart phones viability with Computation Offload

Cloud Computing for hand-held Devices:Enhancing Smart phones viability with Computation Offload IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 13, Issue 1 (Jul. - Aug. 2013), PP 01-06 Cloud Computing for hand-held Devices:Enhancing Smart phones viability

More information

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining

More information

Published by the IEEE Computer Society

Published by the IEEE Computer Society CLOUD COMPUTING FOR MOBILE USERS: CAN OFFLOADING COMPUTATION SAVE ENERGY? Karthik Kumar and Yung-Hsiang Lu, Purdue University The cloud heralds a new era of computing where application services are provided

More information

Security Considerations for Public Mobile Cloud Computing

Security Considerations for Public Mobile Cloud Computing Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of

More information

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description Dropbox for Business Secure file sharing, collaboration and cloud storage G-Cloud Service Description Table of contents Introduction to Dropbox for Business 3 Security 7 Infrastructure 7 Getting Started

More information

Cloud Computing for Education Workshop

Cloud Computing for Education Workshop Cloud Computing for Education Workshop 2012 Copyright REZA CURTMOLA, NJIT Why Should You Learn This? Learn some useful software and services Backup and sync your materials for teaching Data reliability

More information

Cloud computing is a marketing term for technologies that provide servers, outside of the firewall, for:

Cloud computing is a marketing term for technologies that provide servers, outside of the firewall, for: Peter Hirsch Cloud computing is a marketing term for technologies that provide servers, outside of the firewall, for: Computation Software Applications Data access Storage services.that do not require

More information

Cloud Computing Security and Encryption

Cloud Computing Security and Encryption ISSN: 2321-7782 (Online) Volume 1, Issue 5, October 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Cloud

More information

Enhance data security of private cloud using encryption scheme with RBAC

Enhance data security of private cloud using encryption scheme with RBAC Enhance data security of private cloud using encryption scheme with RBAC Dimpi Rani 1, Rajiv Kumar Ranjan 2 M.Tech (CSE) Student, Arni University, Indora, Kangra, India 1 Assistant Professor, Dept. of

More information

Manual for Android 1.5

Manual for Android 1.5 Manual for Android 1.5 1 Table of Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 3 2. Installation... 4 3. Basic functionality... 5 3.1. Setting up Boxcryptor

More information

Windows 8 Hacks O'REILLY* Preston Gralla. Beijing. Cambridge Famham. Koln Sebastopol Tokyo

Windows 8 Hacks O'REILLY* Preston Gralla. Beijing. Cambridge Famham. Koln Sebastopol Tokyo Windows 8 Hacks Preston Gralla Beijing Cambridge Famham O'REILLY* Koln Sebastopol Tokyo Table of Contents Preface vii 1. Setup and Startup Hacks 1 Hack 01. Disable Windows 8's Lock Screen 1 Hack 02. Hack

More information

Mobile Cloud Computing Security Considerations

Mobile Cloud Computing Security Considerations 보안공학연구논문지 (Journal of Security Engineering), 제 9권 제 2호 2012년 4월 Mobile Cloud Computing Security Considerations Soeung-Kon(Victor) Ko 1), Jung-Hoon Lee 2), Sung Woo Kim 3) Abstract Building applications

More information

CARTES 2012 Demo presentation. Secure Cloud Storage

CARTES 2012 Demo presentation. Secure Cloud Storage CARTES 2012 Demo presentation Cloud Computing: NIST Framework Public Private Hybrid Deployment model Infrastructure as a service (IaaS Platform as a service (PaaS) Software as a service (SaaS) Service

More information

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

Cloud Database Storage Model by Using Key-as-a-Service (KaaS) www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah

More information

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation User Guide for OpenDrive Application v1.6.0.4 for MS Windows Platform 20150430 April 2015 Table of Contents Installation 4 Standard Installation Unattended Installation Installation (cont.) 5 Unattended

More information

The Cloud On A Clear Day. Neal Juern

The Cloud On A Clear Day. Neal Juern The Cloud On A Clear Day Neal Juern Alternate Titles The Cloud So what is it anyway? Why is it so cloudy? How To Keep Your Head Out What are the risks? Is it all just marketing fluff? What is The Cloud?

More information

Overview of Cloud Computing (ENCS 691K Chapter 1)

Overview of Cloud Computing (ENCS 691K Chapter 1) Overview of Cloud Computing (ENCS 691K Chapter 1) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ Overview of Cloud Computing Towards a definition

More information

Backing Up Your Files. External Hard Drives

Backing Up Your Files. External Hard Drives Backing Up Your Files As we become more and more dependent on technology to help accomplish our everyday tasks, we tend to forget how easily the information stored on our computers can be lost. Imagine

More information

Overview. Timeline Cloud Features and Technology

Overview. Timeline Cloud Features and Technology Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers

More information

2013 USER GROUP CONFERENCE

2013 USER GROUP CONFERENCE 2013 USER GROUP CONFERENCE The Cloud This session will touch anything and everything cloud based that is important to districts today. We will compare and contrast Google Apps and Office 365, Cloud storage

More information

Storage Made Easy. Cloud File Server Overview

Storage Made Easy. Cloud File Server Overview Storage Made Easy Investor Open Cloud Newsletter File Server Unify, Govern, and Manage your files Cloud File Server Overview Cloud Computing is maturing fast. More and more applications and data are being

More information

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered

More information

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution. FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution. In today s world the potential for ready access to data from virtually any device over any type of network connection creates

More information

Cloud Web-Based Operating System (Cloud Web Os)

Cloud Web-Based Operating System (Cloud Web Os) Cloud Web-Based Operating System (Cloud Web Os) Hesham Abusaimeh Department of Computer Science, Faculty of Information Technology, Applied Science University, Amman, 11931 Jordan. ABSTRACT The cloud computing

More information

Introduction to Dropbox. Jim Miller, LCITO Office 785.296.5566 Mobile 913.484.8013 Email jim.miller@las.ks.gov

Introduction to Dropbox. Jim Miller, LCITO Office 785.296.5566 Mobile 913.484.8013 Email jim.miller@las.ks.gov Introduction to Dropbox Jim Miller, LCITO Office 785.296.5566 Mobile 913.484.8013 Email jim.miller@las.ks.gov Introduction to Dropbox What is it? Why use it? Mitigating the risks of using Dropbox? Dropbox

More information

Video Publishing and Authoring Services Based on Cloud Computing

Video Publishing and Authoring Services Based on Cloud Computing Video Publishing and Authoring Services Based on Cloud Computing Mayur P. Band 1, N. D. Kale 2 P.G. Student, Department of Computer Engineering, TSSM s, PVPIT, Bavdhan, Pune, Maharashtra, India 1 Assistant

More information

2013 Cloud Storage Expectations

2013 Cloud Storage Expectations 2013 Cloud Storage Expectations cloud A recent TechTarget Survey suggests that while many IT budgets are decreasing or remaining flat, cloud projects are still on the rise and will continue to be throughout

More information

Secured Communication Model for Mobile Cloud Computing

Secured Communication Model for Mobile Cloud Computing ISSN (e): 2250 3005 Volume, 05 Issue, 05 May 2015 International Journal of Computational Engineering Research (IJCER) Secured Communication Model for Mobile Cloud Computing Ramandeep Singh Rajpal 1, Raghvendra

More information

Anchor End-User Guide

Anchor End-User Guide Table of Contents How to Access Your Account How to Upload Files How to Download the Desktop Sync Folder Sync Folder How to Share a File 3 rd Party Share from Web UI 3 rd Party Share from Sync Folder Team-Share

More information

Cloud Computing TODAY S TOPICS WHAT IS CLOUD COMPUTING? ICAC Webinar Cloud Computing September 4, 2012. What Cloud Computing is and How it Works

Cloud Computing TODAY S TOPICS WHAT IS CLOUD COMPUTING? ICAC Webinar Cloud Computing September 4, 2012. What Cloud Computing is and How it Works Cloud Computing TODAY S TOPICS What Cloud Computing is and How it Works Security & Privacy Issues Investigative Challenges WHAT IS CLOUD COMPUTING? Cloud computing refers to software or processes offered

More information

Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions

Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas

More information

Introduction to Cloud Services

Introduction to Cloud Services Introduction to Cloud Services (brought to you by www.rmroberts.com) Cloud computing concept is not as new as you might think, and it has actually been around for many years, even before the term cloud

More information

Welcome! What We Do At IntelliSystems, our goal is to get Information Technology and telecommunications management out of your way so that you can focus on your business. Historical PC Business Network

More information

Storgrid EFS Access all of your business information securely from any device

Storgrid EFS Access all of your business information securely from any device Datasheet Storgrid EFS Access all of your business information securely from any device September 2014 2014 STORGRID International Holding BV. This document is created with the utmost care. To prevent

More information

Course 20533: Implementing Microsoft Azure Infrastructure Solutions

Course 20533: Implementing Microsoft Azure Infrastructure Solutions Course 20533: Implementing Microsoft Azure Infrastructure Solutions Overview About this course This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.

More information

Survey On Security Threats In Data Storing & Sharing In Cloud Environment

Survey On Security Threats In Data Storing & Sharing In Cloud Environment Survey On Security Threats In Data Storing & Sharing In Cloud Environment Seema Tahalyani 1 and Dr. S.M Ghosh 2 1 CSE Department, Rungta College of Engineering & Technology, Bhilai, Chhattisgarh, India

More information

NCTA Cloud Architecture

NCTA Cloud Architecture NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,

More information

Cloud Based E-Government: Benefits and Challenges

Cloud Based E-Government: Benefits and Challenges Cloud Based E-Government: Benefits and Challenges Saleh Alshomrani 1 and Shahzad Qamar 2 1 Faculty of Computing and IT, King Abdulaziz University, Jeddah, Saudi Arabia 2 Faculty of Computing and IT, North

More information

Quick View. Folder Details

Quick View. Folder Details Quick View You MUST be logged in to access any information inside the IONU system. If you aren t logged in, you will not see the folders and the data and files cannot be accessed and decrypted. All files,

More information

USER MANUAL. v. 1.0.0.95 Windows Client ------------------------ January 2014 ------------------------

USER MANUAL. v. 1.0.0.95 Windows Client ------------------------ January 2014 ------------------------ USER MANUAL v. 1.0.0.95 Windows Client ------------------------ January 2014 ------------------------ 1 Contents At a Glance Troubleshoot 3 About SkyCrypt 23 FAQ 4 About this manual 23 Contact support

More information

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption. Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune ghatkar.abhaya@gmail.com, jadhavreena70@yahoo.com, renjug03@gmail.com,

More information

Cloud Data Protection for the Masses

Cloud Data Protection for the Masses Cloud Data Protection for the Masses N.Janardhan 1, Y.Raja Sree 2, R.Himaja 3, 1,2,3 {Department of Computer Science and Engineering, K L University, Guntur, Andhra Pradesh, India} Abstract Cloud computing

More information

Investor Newsletter. SMEStorage Open Cloud File Server Unify, Govern, and Manage your files. Cloud File Server Overview

Investor Newsletter. SMEStorage Open Cloud File Server Unify, Govern, and Manage your files. Cloud File Server Overview Investor Newsletter SMEStorage Open Cloud File Server Unify, Govern, and Manage your files Cloud File Server Overview Cloud Computing is maturing fast. More and more applications and data are being built

More information

How cloud computing can transform your business landscape

How cloud computing can transform your business landscape How cloud computing can transform your business landscape Introduction It seems like everyone is talking about the cloud. Cloud computing and cloud services are the new buzz words for what s really a not

More information

Store & Share Quick Start

Store & Share Quick Start Store & Share Quick Start What is Store & Share? Store & Share is a service that allows you to upload all of your content (documents, music, video, executable files) into a centralized cloud storage. You

More information

Setup: Rapidly set up your language, upload speed, and

Setup: Rapidly set up your language, upload speed, and Welcome to ASUS WebStorage, your personal cloud space Our function panel will help you better understand ASUS WebStorage services. The panel and a series of function instructions will guide you to explore

More information

Overview of Offloading in Smart Mobile Devices for Mobile Cloud Computing

Overview of Offloading in Smart Mobile Devices for Mobile Cloud Computing Overview of Offloading in Smart Mobile Devices for Mobile Cloud Computing Roopali, Rajkumari Dep t of IT, UIET, PU Chandigarh, India Abstract- The recent advancement in cloud computing is leading to an

More information

An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm

An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm V.Masthanamma 1,G.Lakshmi Preya 2 UG Scholar, Department of Information Technology, Saveetha School of Engineering

More information

Outsourcing with secure accessibility in mobile cloud computing

Outsourcing with secure accessibility in mobile cloud computing Outsourcing with secure accessibility in mobile cloud computing Monika Waghmare 1, Prof T.A.Chavan 2 Department of Information technology, Smt.Kashibai Navale College of Engineering, Pune, India. Abstract

More information

Cloud computing: the lowdown

Cloud computing: the lowdown 1 de 6 07/11/2011 0:52 Printing sponsored by: Cloud computing: the lowdown Much of our computing (including the storage of our personal data) is now being done remotely via the 'cloud'. But what is it?

More information

Cloud Computing Trends

Cloud Computing Trends UT DALLAS Erik Jonsson School of Engineering & Computer Science Cloud Computing Trends What is cloud computing? Cloud computing refers to the apps and services delivered over the internet. Software delivered

More information

The most comprehensive review and comparison of cloud storage services

The most comprehensive review and comparison of cloud storage services DriveHQ Other Cloud Services The most comprehensive review and comparison of cloud storage services 2003-2013, Drive Headquarters, Inc. Table of Contents 1. Introduction... 4 1.1 Why do we create these

More information

Cloud Computing: Issues Related with Cloud Service Providers

Cloud Computing: Issues Related with Cloud Service Providers Cloud Computing: Issues Related with Cloud Service Providers Nikhil Ranjan Assistant Professor Tula s Institute, Dehradun (An Engineering & Management College) Abstract- The Cloud Computing and the storage

More information

IT Networking and Security

IT Networking and Security elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer

More information

Data Security and Privacy in Cloud using RC6 Algorithm for Remote Data Back-up Server

Data Security and Privacy in Cloud using RC6 Algorithm for Remote Data Back-up Server Data Security and Privacy in Cloud using RC6 Algorithm for Remote Data Back-up Server Ruchira. H. Titare 1, Prof. Pravin Kulurkar 2, 1 2nd year Mtech CSE, Vidarbha Institute of Technology, Nagpur, India,

More information

A STUDY ON CLOUD STORAGE

A STUDY ON CLOUD STORAGE Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.966

More information

An Architecture Model of Sensor Information System Based on Cloud Computing

An Architecture Model of Sensor Information System Based on Cloud Computing An Architecture Model of Sensor Information System Based on Cloud Computing Pengfei You, Yuxing Peng National Key Laboratory for Parallel and Distributed Processing, School of Computer Science, National

More information

Secure Cloud Computing through IT Auditing

Secure Cloud Computing through IT Auditing Secure Cloud Computing through IT Auditing 75 Navita Agarwal Department of CSIT Moradabad Institute of Technology, Moradabad, U.P., INDIA Email: nvgrwl06@gmail.com ABSTRACT In this paper we discuss the

More information

Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led

Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Course Description This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.

More information

Course 20533B: Implementing Microsoft Azure Infrastructure Solutions

Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Sales 406/256-5700 Support 406/252-4959 Fax 406/256-0201 Evergreen Center North 1501 14 th St West, Suite 201 Billings, MT 59102 Course

More information

What Dropbox Can t Do For Your Business

What Dropbox Can t Do For Your Business What Dropbox Can t Do For Your Business 32 Things to Consider When Choosing a Secure File Sharing and Collaboration Service for Your Business A Soonr Study Executive Summary The need for a well-rounded

More information

Security Benefits of Cloud Computing

Security Benefits of Cloud Computing Security Benefits of Cloud Computing FELICIAN ALECU Economy Informatics Department Academy of Economic Studies Bucharest ROMANIA e-mail: alecu.felician@ie.ase.ro Abstract: The nature of the Internet is

More information

In the Cloud. Scoville Memorial Library February, 2013 ccayne@biblio.org

In the Cloud. Scoville Memorial Library February, 2013 ccayne@biblio.org In the Cloud Scoville Memorial Library February, 2013 ccayne@biblio.org What is the Cloud? You may have heard people using terms like the cloud, cloud computing, or cloud storage. But what exactly is the

More information

Implementing Microsoft Azure Infrastructure Solutions

Implementing Microsoft Azure Infrastructure Solutions Course Code: M20533 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Implementing Microsoft Azure Infrastructure Solutions Overview This course is aimed at experienced IT Professionals who currently

More information

[Sudhagar*, 5(5): May, 2016] ISSN: 2277-9655 Impact Factor: 3.785

[Sudhagar*, 5(5): May, 2016] ISSN: 2277-9655 Impact Factor: 3.785 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY AVOID DATA MINING BASED ATTACKS IN RAIN-CLOUD D.Sudhagar * * Assistant Professor, Department of Information Technology, Jerusalem

More information

Web Interface using HTML5 for Interaction between Mobile Device & Cloud- Services

Web Interface using HTML5 for Interaction between Mobile Device & Cloud- Services Web Interface using HTML5 for Interaction between Mobile Device & Cloud- Services Nimit S Modi,Proff.Yask Patel Computer Department,PIET, Baroda. IT Department,PIET,Baroda Abstract Mobile cloud computing

More information

Cloud Computing for Mobile Users: Can Offloading Computation Save Energy?

Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? 1 Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? Karthik Kumar and Yung-Hsiang Lu Purdue University Abstract: The Cloud heralds a new era of computing where application services

More information

WHAT ARE THE KEY FEATURES OF ON DEMAND FILE SERVER?

WHAT ARE THE KEY FEATURES OF ON DEMAND FILE SERVER? INTRODUCING ON DEMAND FILE SERVER FROM BT WHOLESALE APPLICATION STORE WHAT IS ON DEMAND FILE SERVER? The three most common technology challenges facing every small business are data storage, information

More information

Virtualization and Cloud Computing

Virtualization and Cloud Computing Written by Zakir Hossain, CS Graduate (OSU) CEO, Data Group Fed Certifications: PFA (Programming Foreign Assistance), COR (Contracting Officer), AOR (Assistance Officer) Oracle Certifications: OCP (Oracle

More information

HiDrive Intelligent online storage for private and business users.

HiDrive Intelligent online storage for private and business users. HiDrive Intelligent online storage for private and business users. Learn about our many product features! Contents 4 Everything, always and everywhere My file is your file Easy backup 5 Public folder Share

More information

Research Information Security Guideline

Research Information Security Guideline Research Information Security Guideline Introduction This document provides general information security guidelines when working with research data. The items in this guideline are divided into two different

More information

OneDrive for Business from Desktop or Laptop Windows devices

OneDrive for Business from Desktop or Laptop Windows devices OneDrive for Business from Desktop or Laptop Windows devices OneDrive for Business (previously called SkyDrive Pro) is cloud based file store that comes as part of the Uel Office365 subscription. It provides

More information

Mobile Cloud Computing In Business

Mobile Cloud Computing In Business Mobile Cloud Computing In Business Nilam S. Desai Smt. Chandaben Mohanbhai Patel Institute of Computer Applications, Charotar University of Science and Technology, Changa, Gujarat, India ABSTRACT Cloud

More information

E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER

E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER E ach enterprise cloud service has different capabilities. This expert E-Guide deep dives into how to know what you re getting

More information

Fully homomorphic encryption equating to cloud security: An approach

Fully homomorphic encryption equating to cloud security: An approach IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 2 (Jan. - Feb. 2013), PP 46-50 Fully homomorphic encryption equating to cloud security: An approach

More information

Efficient Energy Reduction and Enhancing Security Privacy in Mobile Cloud Computing

Efficient Energy Reduction and Enhancing Security Privacy in Mobile Cloud Computing Efficient Energy Reduction and Enhancing Security Privacy in Mobile Cloud Computing B.Sudhanantham 1, M.Shankar 2 PG Scholar, Dept. of CSE, Angel College of Engineering and Technology, Tirupur, India 1

More information