Cloud Computing E-Voting: A Technical Review
|
|
|
- Cori Malone
- 10 years ago
- Views:
Transcription
1 Cloud Computing E-Voting: A Technical Review Ms.Bhargavi Jadav 1, Ms.Aneri Desai 2, Mr.Fenil Patel 3, Mr.Ronak Patel 4, Ms.Julisha Patel 5, Ms.Bhumika Patel 6 and Mr.Manish vala 7 1,2,3,4,5 Uka Tarsadia University, Bardoli. 6, 7 Uka Tarsadia University, Bardoli, Ass.Prof ABSTRACT Cloud computing is used for data storing in distributed environment and these data can be accessed easily from anywhere anytime. E Voting can be thought of as Good Governance in India. Current E-Voting system has some issues of counting votes, fraud in making dummy votes and lake of privacy. However, to solve such issues cloud computing offers numbers of opportunities, but the developments of cloud computing technologies are still at babyhood stage. In this paper, we represent the survey of cloud computing, review of different methods used for cloud based E-Voting system over the aadhar-card, SMS and Traditional System. The main aim of this paper is to find out the challenges faced in current E-Voting system and privacy issues, which are important aspect of E-Voting. Keywords: Cloud Computing, E-Voting 1. INTRODUCTION 1.1 Cloud Computing Cloud computing is a new technology that provides the computing platform for sharing resources that includes infrastructures, software, data centers, applications, and business processes. It is a focus on sharing data. These nodes include end user, computers, data centers and cloud services. Cloud computing provides the computer technology via the Internet. This was the predecessor to today s Internet, which currently has approximately 2.8 billion users worldwide [7]. With the rapid development of processing and storage technologies and the success of the Internet, computing resources have become cheaper, more powerful and more ubiquitously available than ever before. This technological trend has enabled the realization of a new computing model called cloud computing [3]. Clouds offer services that can be grouped into three categories: software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS). Figure 1.1 Services of Cloud Computing. [3] Infrastructure as a Service: IaaS refers to on-demand provisioning of infrastructural resources, usually in terms of VMs. The cloud owner who offers IaaS is called an IaaS provider Platform as a Service: PaaS refers to providing platform layer resources, including operating system support, software development frameworks and software patches Software as a Service: SaaS refers to providing ondemand applications over the Internet. 1.2 Types of Clouds: Public Cloud : These services are open for all public VOLUME-2, ISSUE-11, NOV-2015 COPYRIGHT 2015 IJREST, ALL RIGHT RESERVED 8
2 use. These clouds are owned and maintained by third parties. It may be free of cost Private Cloud : These clouds are hosted and managed by single organization. These cloud services are accessible only to authorized members of the organization Hybrid Cloud : It is the combination of both public and private cloud. It not only provides the benefits of both public and private cloud models, but also overcomes their drawbacks. [9] [2]. When existing services of the private cloud does not satisfy the requirements then organization can use the services of public cloud and that leads to hybrid cloud. 1.3 Characteristics of Cloud Computing Cloud computing provides many prominent features those are different from traditional system. Multi-tenancy: In this cloud environment, services owned by different providers are located to one single data center. The mutual management and performance issues will be shared among service provider. Shared resource pooling: Resource pooling allows cloud provider to provide one pool of large IT scale resources to serve multiple cloud consumers. Different resources will be assigned or reassigned according to the cloud consumer demand.[ 3] 1.4 Benefits of Cloud Computing: Cloud helps you in analyzing large amount of data and in detecting any discrepancy. Provides mechanism to enhance the security and reliability of data. It Provide the location independent platform for the communication using fast reliable Internet with efficient fast computing power so that a user can work anytime form anywhere using the web cast the votes. It allows you to do backup and also restoring the data. It will provide the quality services at the tome of high load by using the number of resources. E voting application can be speedup using the cloud architecture that provides more powerful server, more memory, CPU, and fast storage device. 1.5 E-Voting [5] E voting is an election system that allow voter to cast their votes electronically. This voting technology includes punched cards, optical scan voting system. It can involve transmission of votes via computer network or Internet. In General, Two main types of e voting can be identified: E voting which is physically supervised by independent electoral authorities (e.g. voting machine located at polling stations) Remote e voting, which is not physically, and it will also supervised by independent electoral authorities (e.g. voting from personal computer, mobile phone via Internet) called I voting. e-voting using cloud technology provides the following solutions to overcomes the deficiency in the existing system: It will reduce the expenses of voting by reducing the cost of printing and distribution of the paper, creating the polling booths etc. It will provide speed, privacy, authentication, and userfriendly environment to the voter. Number of user can cast their votes at a one time depending on the computer and Internet connection. E voting system is directly connected to the election commission server so the system is fair and accurate. E Voting system provides the facility to record the individual s vote and count accurately, so the result can be declared quickly. 2. LITERATURE REVIEW 2.1 Related Work: Cloud computing is used in many different area, one of the area is e voting. There are many methods have been proposed in E voting with cloud computing, in [7] author has used traditional voting system with open cloud system. The voter identity is done manually by election officer by cross verifying the voter Id and their manual data present over the database. The voter identity is not cross verified by the electronic voting machine, so there is no complete security over the voting machine system. This cloud voting system where the system verifies the voter uniquely from his database present on the server. In [7] there will provide security and authenticity of the voter the voting system. The cloud voting system will be controlled over the centralized server of the voting system. The voter will cast the vote once then automatically the system will close. VOLUME-2, ISSUE-11, NOV-2015 COPYRIGHT 2015 IJREST, ALL RIGHT RESERVED 9
3 Figure 3: two-fold Voting System [6] The above system can define using fore phases: Figure 2: Proposed cloud voting system with security over cloud voting [7] Author explains the [6] existing system using DRE voting system. This system provides a smartcard for every voter to vote. Using smartcard voter can vote for the candidate of their choice. The advantages of using this card is that it reduces the chances of duplication in voting a single voter can cast only in vote with that smartcard number. It will provide confidentiality, and security in the system by storing the biometric details is the registered earlier. After the process of voting is completed the voter is given to chance to review and confirm their vote but it will give only 30sec for reviewing and for the conformation. This proposed system is a two-fold system of SMS voting system and website voting. 1) Registration 2) Authentication 3) Voting 4) Counting Registration Phase: If Voter want to do voting into the system than, Voter has to register him/her self in to the website or system 2.2 SMS Voting System: Voter can cast his/her vote by sending SMS to the system using any kind of hand set through the mobile switching center. In this case voter dial a toll-free number in which he/she has to answer the recorded call. During the voting process the voter has to give his/her voice sample on the call in order to prove his/her identity and avoid frauds. This system works only on Android phone. 2.3 Website Voting System: Voter can also use the Internet for the Voting proposed. Both android phone and the website are link with same database on backend so that the voter can vote from two-way. Only once voter can vote otherwise system will deny him/her to do so. Figure 4: Registration [6] Authentication phase: Voter will be verified from the voter database. If it is completed than it provided access to next stage. VOLUME-2, ISSUE-11, NOV-2015 COPYRIGHT 2015 IJREST, ALL RIGHT RESERVED 10
4 2.3.4 Counting Phase: Counting authority directly count the votes and declare the election results. In this case security is major issue for voting. Author explains the [5] electronic election process or e- voting, involves three basic steps: 1) Election booth setup 2) Voting 3) Result Figure 5: Authentication [6] Voting Phase: Voter cast his/her votes for the election and voting authority encrypt the vote and sends it to counting authority. Election booth setup: It required polling officer for election setup, which will provide the infrastructure for voter to scan the fingerprint and iris. Voting: They provide one voting website in which first system will authenticate the identity of voter if successful voter can cast there vote. Voter will clicking on election and election ballot is appear when he/she submit the ballot the vote is encrypted and the voter issue a token number and now voter is block so it can not vote again. Result: Now result is calculated after voting has ended and election commission declares result. About this proposed system they use three modules: 1) User Request and authentication (URA) 2) Vote counting server (VCS) 3) Service management (SM) Figure 6: Voting [6] User Request and authentication: When voter request for doing vote from any of the polling center of the country then system ask for UID (user identification) No and scan the iris and fingerprint of both the hand. Then UAS (User Authentication Server) will verify the identity by using UID card i.e., AADHAR CARD. If authentication is done then voter is connected to polling server and e-ballot paper is loaded on register computer that is mention on aadhar permanent address. Vote counting server: It is the server that receives the votes by the election commission server. The VCS collects the votes and provide the result. Service management: The model will essentially monitor the services in terms of authenticity, privacy, security, service delivery time and quality, also responsible for secured service by fetching and delivering the service. VOLUME-2, ISSUE-11, NOV-2015 COPYRIGHT 2015 IJREST, ALL RIGHT RESERVED 11
5 Reduces the expenses of voting by reducing the cost of paper ballots, crating polling booths & parties expenses. Voter can cast their votes for anyplace. It will provide speed, authentication and user friendly environment to the voter. Figure 7: Proposed Framework Model for e Voting [5] Figure 8: Service Request & Delivery in Proposed e Voting [5] In this figure the voter request for the voting, first polling server do authentication and than it will provide the e-ballot paper, than the voter submit their votes in election commission server, and generate the token. 2.4 Benefits E voting based on cloud technology provides the following solutions to overcome the difficulty in existing system. 3. CONCLUSION In e voting with cloud computing we conclude that user can do their votes easily but the problem is that they can t provide the privacy to the user. They can see the users details and they can also do the changes. There are different types of methods like Message, web Sites, using Aadhar Card, Phone calls etc., to do voting in that only one problem will arrive that is a user privacy so using pay-liar algorithm we can secure the user privacy and maintain safe. REFERENCE [1] Tadayoshi kohno, Adam stubblefied, Analysis of an Electronic Voting System,IEEE computer society press, July [2] Haibo Yang, Mary Tate, Where are we at with cloud computing?:a Descriptive Literature Review,AIS Electronic Library(AISeL), Dec [3] Qi Zhang, Lu Cheng, Raouaf Boutaba, Cloud computing: state-of-the-art and research challenges,j Internet Serv Appl, April [4] Feras a. haziemeh, mutaz kh. Khazaaleh, khairall m. aktalafha, new applied e-voting system, Publication of little lion scientific R&D, Islamabad, vol.25.no.2, March 31. [5] Ashutosh Gupta, Praveen Dhyani,O.P.Rishi, Cloud based e-voting: one step ahead for good governance in India, International journal of computer application,vol.67.no.6,april [6] Anisaara Nadaph, Ashmita Katiyar, Tushar Naidu, Rakhi Bondre, Durgesh Kumari Goswami, An Analysis of secure online voting system, International journal of Innovative Research in computer science & technology(ijircst),vol.2. September [7] Mohan Reddy, Electronic-voting approach with an open cloud computing architecture, International journal of engineering and computer science,vol.3.no , November VOLUME-2, ISSUE-11, NOV-2015 COPYRIGHT 2015 IJREST, ALL RIGHT RESERVED 12
6 [8] Pankaj Kumar malviya, E-voting system using cloud in indian scenario, International journal of engineering science & advanced Techonology(IJESAT),vol.3, Mar- Apr [9] Rabinadnan kishor, Implementation of cloud for online election system,international journal of advance research in computer science and management studies,vol.3, March [10] Patrick honer, Cloud Computing Security Requirements and Solutions:A Systematic Literature Review June [11] llango Sriram, Ali Khajeh-Hosseini, Research Agenda in Cloud Technologies August [12] Krishan Kant Lavania, Yogita Sharma, Chandresh bakliwal, A Review On Cloud Computing Model,Internaton journal on Recent and Innovation Trends in Computing and Communication(IJRITCC),vol.1.Mar [13] Robert Krimmer, Electronic Voting,2 nd Internation workshop co-organized council of Europe, Augest VOLUME-2, ISSUE-11, NOV-2015 COPYRIGHT 2015 IJREST, ALL RIGHT RESERVED 13
An Implementation of Secure Online Voting System
An Implementation of Secure Online Voting System Prof. Anisaara Nadaph 1, Rakhi Bondre 2, Ashmita Katiyar 3, Durgesh Goswami 4, Tushar Naidu 5 1 Pune University, Trinity college of Eng. And res., [email protected]
International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015.
Android Based E-Voting. Harshad Velapure, Saurabh Rai, Saransh Sharma, Preetam Naiknavre, Pranali Jadhav, Kalyan Bamane Department of Information Technology, D. Y. Patil College of Engineering, Akurdi,
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION Sanjay Razdan Department of Computer Science and Eng. Mewar
An Electronic Voting System Based On Blind Signature Protocol
CSMR, VOL. 1, NO. 1 (2011) An Electronic Voting System Based On Blind Signature Protocol Marius Ion, Ionuţ Posea University POLITEHNICA of Bucharest Faculty of Automatic Control and Computers, Computer
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
Reallocation and Allocation of Virtual Machines in Cloud Computing Manan D. Shah a, *, Harshad B. Prajapati b
Proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA-14) Reallocation and Allocation of Virtual Machines in Cloud Computing Manan
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Best Practices for Security in the Cloud John Essner, Director
SURVEY OF ADAPTING CLOUD COMPUTING IN HEALTHCARE
SURVEY OF ADAPTING CLOUD COMPUTING IN HEALTHCARE H.Madhusudhana Rao* Md. Rahmathulla** Dr. B Rambhupal Reddy*** Abstract: This paper targets on the productivity of cloud computing technology in healthcare
Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
The Design of Web Based Secure Internet Voting System for Corporate Election
The Design of Web Based Secure Internet Voting System for Corporate Election Jagdish B. Chakole 1, P. R. Pardhi 2 \ 1 Deptt. of Computer Science & Engineering, R.C.O.E.M., Nagpur, Maharashtra (India) 2
Quattra s Cloud Vision & Framework Value
Quattra s Cloud Vision & Framework Value Data centers provide the foundation for the applications and services that organizations deliver, and companies need their IT facilities to be reliable, compliant
Offline and Online E-Voting System with Embedded Security for Real Time Application
Offline and Online E-Voting System with Embedded Security for Real Time Application Alaguvel.R 1 and Gnanavel.G 2 1 Department of Electrical and Electronics Engineering, V.R.S College of Engineering&Technology,
A Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer [email protected]
Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing
Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Survey on Load
Cloud Computing Security Issues And Methods to Overcome
Cloud Computing Security Issues And Methods to Overcome Manas M N 1, Nagalakshmi C K 2, Shobha G 3 MTech, Computer Science & Engineering, RVCE, Bangalore, India 1,2 Professor & HOD, Computer Science &
How To Understand Cloud Computing
Cloud Computing: Comparison with Previous Technique and Research Challenges Nimisha Gupta Bharti Chauhan Tanvi Anand Charul Dewan Assistant Professor(IT), ABSTRACT Cloud computing has recently emerged
Security Threat Risk Assessment: the final key piece of the PIA puzzle
Security Threat Risk Assessment: the final key piece of the PIA puzzle Curtis Kore, Information Security Analyst Angela Swan, Director, Information Security Agenda Introduction Current issues The value
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
Keywords: Cloud computing, Characteristics of Cloud computing, Models of Cloud computing, Distance learning, Higher education.
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Analysis of Cloud
Cloud Panel Service Evaluation Scenarios
Cloud Panel Service Evaluation Scenarios August 2014 Service Evaluation Scenarios The scenarios below are provided as a sample of how Finance may approach the evaluation of a particular service offered
Secure Cloud Computing through IT Auditing
Secure Cloud Computing through IT Auditing 75 Navita Agarwal Department of CSIT Moradabad Institute of Technology, Moradabad, U.P., INDIA Email: [email protected] ABSTRACT In this paper we discuss the
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
Migration Improved Scheduling Approach In Cloud Environment
Migration Improved Scheduling Approach In Cloud Environment Ashu Rani [1], Jitender Singh [2] [1] Scholar in RPS College of Engineering & Technology, Balana, Mohindergarh [2] Asst. Prof. in RPS College
APPLICATION OF CLOUD COMPUTING IN ACADEMIC INSTITUTION
APPLICATION OF CLOUD COMPUTING IN ACADEMIC INSTITUTION 1 PRIYANKA DUKLE, 2 TRISHALA PAWAR, 3 SNEH BHAT 1,2,3 Computer, Amrutvahini College of Engineering, Sangamner Email: [email protected] 1, [email protected]
CRVS and Identity Management
INFORMATION NOTE D CRVS and Identity Management I. Purpose This is a non-official document, for information only, prepared by the Working group of coorganizers of the Ministerial Conference on Civil Registration
A Comparative Study of cloud and mcloud Computing
A Comparative Study of cloud and mcloud Computing Ms.S.Gowri* Ms.S.Latha* Ms.A.Nirmala Devi* * Department of Computer Science, K.S.Rangasamy College of Arts and Science, Tiruchengode. [email protected]
Remote (Internet) Voting in Digital India
Remote (Internet) Voting in Digital India Ideas for today and tomorrow National Conference on Remote Voting (NCRV) 2015 20-21 st July 2015 @IITM, Meghdoot, Pune The fundamental challenge in public voting
A STUDY ON CLOUD STORAGE
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.966
A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
Mobile Cloud Computing In Business
Mobile Cloud Computing In Business Nilam S. Desai Smt. Chandaben Mohanbhai Patel Institute of Computer Applications, Charotar University of Science and Technology, Changa, Gujarat, India ABSTRACT Cloud
A Study on the Cloud Computing Architecture, Service Models, Applications and Challenging Issues
A Study on the Cloud Computing Architecture, Service Models, Applications and Challenging Issues Rajbir Singh 1, Vivek Sharma 2 1, 2 Assistant Professor, Rayat Institute of Engineering and Information
Dynamic Load Balancing: Improve Efficiency in Cloud Computing Argha Roy * M.Tech CSE Netaji Subhash Engineering College West Bengal, India.
Dynamic Load Balancing: Improve Efficiency in Cloud Computing Argha Roy * M.Tech CSE Netaji Subhash Engineering College West Bengal, India. Diptam Dutta M.Tech CSE Heritage Institute of Technology West
International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-0056. Volume: 02 Issue: 05 Aug-2015 www.irjet.net p-issn: 2395-0072
Fear of Cloud Vinnakota Saran Chaitanya 1, G. Harshavardhan Reddy 2 1 UG Final year student, Department of Computer Science and Engineering, G. Pulla Reddy Engineering College, Andhra Pradesh, India 2
Cloud Computing. Course: Designing and Implementing Service Oriented Business Processes
Cloud Computing Supplementary slides Course: Designing and Implementing Service Oriented Business Processes 1 Introduction Cloud computing represents a new way, in some cases a more cost effective way,
Cloud Computing Architectures and Design Issues
Cloud Computing Architectures and Design Issues Ozalp Babaoglu, Stefano Ferretti, Moreno Marzolla, Fabio Panzieri {babaoglu, sferrett, marzolla, panzieri}@cs.unibo.it Outline What is Cloud Computing? A
CHAPTER 8 CLOUD COMPUTING
CHAPTER 8 CLOUD COMPUTING SE 458 SERVICE ORIENTED ARCHITECTURE Assist. Prof. Dr. Volkan TUNALI Faculty of Engineering and Natural Sciences / Maltepe University Topics 2 Cloud Computing Essential Characteristics
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University
E-Democracy and e-voting
E-Democracy and e-voting How to make them secure and transparent August 2013 Jordi Puiggali CSO and SVP R&D [email protected] Index Introduction e-democracy Security and Transparency in e-voting
CLOUD COMPUTING AND ITS SECURITY ASPECTS
CLOUD COMPUTING AND ITS SECURITY ASPECTS Subhash Basishtha 1, Saptarshi Boruah 2 1 Department of Information Technology, Assam University, Silchar-788011, India 2 Department of Information Technology,
Role of Cloud Computing to Overcome the Issues and Challenges in E-learning
Journal of Basic and Applied Engineering Research pp. 66-70 Krishi Sanskriti Publications http://www.krishisanskriti.org/jbaer.html Role of Cloud Computing to Overcome the Issues and Challenges in E-learning
Cloud SQL Security. Swati Srivastava 1 and Meenu 2. Engineering College., Gorakhpur, U.P. Gorakhpur, U.P. Abstract
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 5 (2014), pp. 479-484 International Research Publications House http://www. irphouse.com /ijict.htm Cloud
Iaas for Private and Public Cloud using Openstack
Iaas for Private and Public Cloud using Openstack J. Beschi Raja, Assistant Professor, Department of CSE, Kalasalingam Institute of Technology, TamilNadu, India, K.Vivek Rabinson, PG Student, Department
Decision on adequate information system management. (Official Gazette 37/2010)
Decision on adequate information system management (Official Gazette 37/2010) Pursuant to Article 161, paragraph (1), item (3) of the Credit Institutions Act (Official Gazette 117/2008, 74/2009 and 153/2009)
NATIONAL TALLY CENTER (NTC) OPERATIONS PROCEDURES. 2014 Presidential and Provincial Council Elections
NATIONAL TALLY CENTER (NTC) OPERATIONS PROCEDURES 2014 Presidential and Provincial Council Elections Introduction... 3 Objectives... 4 Data Security and Integrity Measures... 4 Structure and Staffing...
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan
Cloud-Security: Show-Stopper or Enabling Technology?
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
CLOUD COMPUTING OVERVIEW
CLOUD COMPUTING OVERVIEW http://www.tutorialspoint.com/cloud_computing/cloud_computing_overview.htm Copyright tutorialspoint.com Cloud Computing provides us a means by which we can access the applications
Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access
Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access Vikas Jain Director, Product Management Intel Corporation Jesper Tohmo CTO, Nordic Edge (an Intel company) Session ID:
A Survey Paper: Cloud Computing and Virtual Machine Migration
577 A Survey Paper: Cloud Computing and Virtual Machine Migration 1 Yatendra Sahu, 2 Neha Agrawal 1 UIT, RGPV, Bhopal MP 462036, INDIA 2 MANIT, Bhopal MP 462051, INDIA Abstract - Cloud computing is one
A Survey on Load Balancing Techniques Using ACO Algorithm
A Survey on Load Balancing Techniques Using ACO Algorithm Preeti Kushwah Department of Computer Science & Engineering, Acropolis Institute of Technology and Research Indore bypass road Mangliya square
Efficient Cost Scheduling algorithm with Load Balancing in a Cloud Computing Environment
Efficient Cost Scheduling algorithm with Load Balancing in a Cloud Computing Environment Amanpreet Chawla, Navtej Singh Ghumman Department of Computer Science and Engineering, SBSSTC, FZR, Punjab, India
THE IMPACT OF CLOUD COMPUTING ON ENTERPRISE ARCHITECTURE. Johan Versendaal
THE IMPACT OF CLOUD COMPUTING ON ENTERPRISE ARCHITECTURE Johan Versendaal HU University of Applied Sciences Utrecht Nijenoord 1, 3552 AS Utrecht, Netherlands, [email protected] Utrecht University
De-duplication The Complexity in the Unique ID context
De-duplication The Complexity in the Unique ID context 1. Introduction Citizens in India depend on the Government for various services at various stages of the human lifecycle. These services include issuance
Private vs. Public Cloud Solutions
Private vs. Public Cloud Solutions Selecting the right cloud technology to fit your organization Introduction As cloud storage evolves, different cloud solutions have emerged. Our first cloud whitepaper
A Study on Service Oriented Network Virtualization convergence of Cloud Computing
A Study on Service Oriented Network Virtualization convergence of Cloud Computing 1 Kajjam Vinay Kumar, 2 SANTHOSH BODDUPALLI 1 Scholar(M.Tech),Department of Computer Science Engineering, Brilliant Institute
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 2, February 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Analysis of
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT OF STATE Harrisburg, PA 17120 BASIC GUIDE TO STUDENT VOTING IN PENNSYLVANIA
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT OF STATE Harrisburg, PA 17120 PEDRO A. CORTÉS Secretary of the Commonwealth www.dos.state.pa.us BASIC GUIDE TO STUDENT VOTING IN PENNSYLVANIA INTRODUCTION The traveling
The Key Components of a Cloud-Based Unified Communications Offering
The Key Components of a Cloud-Based Unified Communications Offering Organizations must enhance their communications and collaboration capabilities to remain competitive. Get up to speed with this tech
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India
Securing e-government Web Portal Access Using Enhanced Two Factor Authentication
Securing e-government Web Portal Access Using Enhanced Two Factor Authentication Ahmed Arara 1, El-Bahlul Emhemed Fgee 2, and Hamdi Ahmed Jaber 3 Abstract This paper suggests an advanced two-factor authentication
A Novel Approach for Efficient Load Balancing in Cloud Computing Environment by Using Partitioning
A Novel Approach for Efficient Load Balancing in Cloud Computing Environment by Using Partitioning 1 P. Vijay Kumar, 2 R. Suresh 1 M.Tech 2 nd Year, Department of CSE, CREC Tirupati, AP, India 2 Professor
EXIN Cloud Computing Foundation
Sample Questions EXIN Cloud Computing Foundation Edition April 2013 Copyright 2013 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing
Essential Characteristics of Cloud Computing: On-Demand Self-Service Rapid Elasticity Location Independence Resource Pooling Measured Service
Cloud Computing Although cloud computing is quite a recent term, elements of the concept have been around for years. It is the maturation of Internet. Cloud Computing is the fine end result of a long chain;
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
Secure Electronic Voting
7 th Computer Security Incidents Response Teams Workshop Syros,, Greece, September 2002 Secure Electronic Voting New trends, new threats... Prof.. Dr. Dimitris Gritzalis Dept. of Informatics Athens University
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,
Manage all your Office365 users and licenses
Manage all your Office365 users and licenses Delegate 365 White Paper Authors: Toni Pohl, Martina Grom Version: 1.2 of December 2014 atwork information technology gmbh. All rights reserved. For information
Cloud Security. Peter Jopling [email protected] IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation
Cloud Security Peter Jopling [email protected] IBM UK Ltd Software Group Hursley Labs peterjopling 2011 IBM Corporation Cloud computing impacts the implementation of security in fundamentally new ways
AN EFFICIENT LOAD BALANCING APPROACH IN CLOUD SERVER USING ANT COLONY OPTIMIZATION
AN EFFICIENT LOAD BALANCING APPROACH IN CLOUD SERVER USING ANT COLONY OPTIMIZATION Shanmuga Priya.J 1, Sridevi.A 2 1 PG Scholar, Department of Information Technology, J.J College of Engineering and Technology
International Journal of Engineering Research & Management Technology
International Journal of Engineering Research & Management Technology March- 2015 Volume 2, Issue-2 Survey paper on cloud computing with load balancing policy Anant Gaur, Kush Garg Department of CSE SRM
Designing Virtual Labs Using Cloud Computing
ISSN:2320-0790 Designing Virtual Labs Using Cloud Computing Parag Nemade 1, Vaibhav Jaybhaye 2, Neethu Menon 3, Smita Dange 4 Student 1,2,3,, Asst. Prof. 4 Fr.C.R.I. T,Navi Mumbai Abstract: Cloud computing
Microsoft Azure Multi-Factor authentication. (Concept Overview Part 1)
Microsoft Azure Multi-Factor authentication (Concept Overview Part 1) In this Document we will discuss the concept of Azure Multifactor Authentication (MFA) concept, when and how you can use it and what
Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka. www.ijreat.org
Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks Kruthika S G 1, VenkataRavana Nayak 2, Sunanda Allur 3 1, 2, 3 Department of Computer Science, Visvesvaraya Technological
Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Computing
The Private Cloud Your Controlled Access Infrastructure
White Paper: Private Clouds The ongoing debate on the differences between a Public and Private Cloud are broad and often loud. The bottom line is that it s really about how the resource, or computing power,
Migration of Virtual Machines for Better Performance in Cloud Computing Environment
Migration of Virtual Machines for Better Performance in Cloud Computing Environment J.Sreekanth 1, B.Santhosh Kumar 2 PG Scholar, Dept. of CSE, G Pulla Reddy Engineering College, Kurnool, Andhra Pradesh,
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,
Optimized Multi-tenancy Secure mechanism in SPI Cloud Architecture
Volume 1, No. 12, February 2013 ISSN 2278-1080 The International Journal of Computer Science & Applications (TIJCSA) RESEARCH PAPER Available Online at http://www.journalofcomputerscience.com/ Optimized
LEGAL ISSUES IN CLOUD COMPUTING
LEGAL ISSUES IN CLOUD COMPUTING RITAMBHARA AGRAWAL INTELLIGERE 1 CLOUD COMPUTING Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing
Improving Online Security with Strong, Personalized User Authentication
Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware
Load Balancing for Improved Quality of Service in the Cloud
Load Balancing for Improved Quality of Service in the Cloud AMAL ZAOUCH Mathématique informatique et traitement de l information Faculté des Sciences Ben M SIK CASABLANCA, MORROCO FAOUZIA BENABBOU Mathématique
Load Balancing in Cloud Computing using Observer's Algorithm with Dynamic Weight Table
Load Balancing in Cloud Computing using Observer's Algorithm with Dynamic Weight Table Anjali Singh M. Tech Scholar (CSE) SKIT Jaipur, [email protected] Mahender Kumar Beniwal Reader (CSE & IT), SKIT
Presenter: Hamed Vahdat-Nejad
Hussein Shirvani Pervasive and Cloud Computing Lab University of Birjand, Birjand, Iran [email protected] Hamed Vahdat-Nejad Pervasive and Cloud Computing Lab University of Birjand, Birjand,
