IMPLEMENTATION OF NOVEL MODEL FOR ASSURING OF CLOUD DATA STABILITY
|
|
- Dina Griffin
- 8 years ago
- Views:
Transcription
1 INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE IMPLEMENTATION OF NOVEL MODEL FOR ASSURING OF CLOUD DATA STABILITY K.Pushpa Latha 1, V.Somaiah 2 1 M.Tech Student, Dept of CSE, Arjun College of Technology & Sciences, Hyderabad, T.S, India 2 Assistant Professor, Dept of CSE, Arjun College of Technology & Sciences, Hyderabad, T.S, India ABSTRACT: For provision of access, cloud service provider preserves numerous replicas for data on distributed servers. Cloud storage and stability determines accuracy and moreover actual cost for every transaction. We focus on a variety of consistency semantics in commercial cloud systems, in which loosely synchronized clock is appropriate for our solution. We make available a new consistency as a service representation, which include huge data cloud and numerous small audit clouds. In the proposed structure data cloud is managed by means of providers of cloud service and users comprising an audit cloud confirming assured level of cloud data consistency. We put forward a two-level auditing structural design that requires a loosely coordinated clock within audit cloud. In this scheme local auditing was separately performed by user by means of a local trace of functions and at regular intervals, an auditor is chosen from audit cloud to carry out global auditing by comprehensive trace of functions. Keywords: Cloud storage, Two-level auditing, Consistency as a service, Global auditing, Audit cloud, Synchronized, Distributed servers. 1. INTRODUCTION: Services of cloud storage are considered as a representative service within cloud computing, that involves delivering of data storage as a service. Providers of cloud service store up data replicas on numerous distributed servers. An important difficulty of usage of replication method within clouds 2089 P a g e
2 is that it is extremely costly to attain tough cloud to carry out global auditing by consistency in which user is ensured of most comprehensive trace of functions [2]. recent updates [1]. By usage of services of cloud storage, customers access data that is 2. METHODOLOGY: stored in cloud by means of any device, Services of cloud storage turn out to be devoid of capital investment when commercially well accepted because of their organizing of hardware infrastructures. A great number of advantages. An important cloud is basically an important distributed difficulty of usage of replication method system in which data is replicated on within clouds is that it is extremely costly to numerous distributed servers for achieving attain strong constancy on a wide-reaching of high accessibility as well as high scale. Complexity of usage of replication performance. Traditional commercial clouds method within clouds is that it is extremely typically confine tough consistency costly to attain tough consistency in which assurance to minute datasets or else offer user is ensured of most recent updates. Our eventual constancy. In our work we provide work introduces a novel consistency as a a novel consistency as a service service representation, which include huge representation, which include huge data data cloud and numerous small audit clouds. cloud and numerous small audit clouds. In Data cloud is managed by means of the proposed system of consistency as a providers of cloud service and users service representation data cloud is managed comprising an audit cloud confirming by means of providers of cloud service and assured level of cloud data consistency and users comprising an audit cloud confirming consists of users that cooperate on job. A assured level of cloud data consistency. We service level agreement will be employed suggest a two-level auditing structural among data cloud as well as audit cloud that design that requires a loosely coordinated stipulate consistency level that has to be clock within audit cloud. Here local auditing provided by data cloud. The functioning of was separately performed by user by means the data cloud is unclear to the entire users of a local trace of functions and at regular because of virtualization technique hence it intervals, an auditor is chosen from audit is tough for the users to make sure whether each replica in data cloud is most recent one P a g e
3 We suggest a two-level auditing structural design that requires a loosely coordinated clock for commanding operations within audit cloud. With proposed consistency as a service representation, users assess quality of cloud services and prefer a right cloud service provider between varieties of candidates. We spotlight on various consistency semantics in commercial cloud systems, in which loosely synchronized clock is appropriate. In particular, we necessitate each user to preserve a logical vector for partial instructing of operations, and adopt a two-level auditing structure in which each user performs local auditing separately by means of a local trace of functions. At regular intervals, an auditor is chosen from audit cloud to carry out global auditing by means of a global trace of functions [3][4]. Users will exchange messages following execution of a set of reads or else writes, to a certain extent than communication instantly subsequent to executing of each operation. Local auditing mainly focus on monotonic-read consistency that is performed by light-weight online algorithm. Global auditing focuses on causal constancy that is performed by instructing of a directed graph. 3. AN OVERVIEW OF PROPOSED SYSTEM: Cloud computing has gained attention since has been providing scalability, flexibility and more accessibility at a low expenditure. Particularly for interactive applications, efficient assuring of Conventional commercial clouds typically confine tough consistency assurance to minute datasets or else offer eventual reliability. Our solution belongs towards verification of trace basis and we provide a novel consistency as a service representation, which include huge data cloud and numerous small audit clouds. We spotlight on various consistency semantics in commercial cloud systems, in which loosely synchronized clock is appropriate for our solution [5]. Consistency as a service data is managed by means of providers of cloud service and users comprising an audit cloud confirming assured level of cloud data consistency. Consistency as a service representation includes data cloud and several audit clouds and the data cloud that is maintained by cloud service provider is an important data storage system in which data is recognized by a distinctive key. With the consistency as a service representation, users assess quality of cloud services and prefer a right cloud 2091 P a g e
4 service provider between varieties of candidates. An audit cloud includes group of users that assist on a job and we assume that each of the user within audit cloud is recognized by an exceptional ID. Earlier than outsourcing job to data cloud, audit cloud as well as data cloud will connect in a service level agreement that stipulates assured level of constancy that has to be provided by data cloud. A service level agreement will be employed among data cloud as well as audit cloud that stipulate consistency level that has to be provided by data cloud. The audit cloud verifies whether data cloud go against the service level agreement or not, and to measure strictness of violations. We suggest a two-level auditing structural design that requires a loosely coordinated clock for commanding operations within audit cloud. In the twolevel auditing structural design each user performs local auditing separately by means of a local trace of functions and at regular intervals, an auditor is chosen from audit cloud to carry out global auditing by means of a global trace of functions. In two-level auditing representation each user record his function within a user operation table,which refers to local trace of operations. Local auditing can be executed independently by means of each user by his individual user operation table; regularly, an auditor is elected from audit cloud and here the entire other users will forward their user operation table to auditor, which will carry out global auditing by means of a global trace of process. Users will exchange messages subsequent to execution of a set of reads or else writes, to a certain extent than communication instantly subsequent to executing of each operation [6]. When two users conclude communication, a causal association on their operations is recognized. Fig1: Proposed consistency as a service representation. 4. CONCLUSION: To make available always-on services, cloud service provider replicates the entire data on several geographically cloud servers. We focus on a variety of consistency semantics in commercial cloud systems, in which loosely synchronized clock is appropriate for our solution. We require each user to preserve a logical vector for partial instructing of operations, and adopt a two P a g e
5 level auditing structure in which each user performs local auditing separately by means of a local trace of functions. We put forward a two-level auditing structural design that requires a loosely coordinated clock within audit cloud and local auditing was separately performed by user by means of a local trace of functions and at regular intervals, an auditor is chosen from audit cloud to carry out global auditing by comprehensive trace of functions. We provide a new consistency as a service representation, which include huge data cloud and numerous small audit clouds. In this system data cloud is managed by means of providers of cloud service and users comprising an audit cloud confirming assured level of cloud data consistency. In consistency as a service representation the data cloud that is maintained by cloud service provider is an important data storage system in which data is recognized by a distinctive key. [3] H. Wada, A. Fekete, L. Zhao, K. Lee, and A. Liu, Data consistency properties and the trade-offs in commercial cloud storages: the consumers perspective, in Proc CIDR. [4] A. Aiyer, L. Alvisi, and R. Bazzi, On the availability of non-strict quorum systems, Distributed Computing, vol. 3724, [5] J. Misra, Axioms for memory access in asynchronous hardware systems, ACM Trans. Programming Languages and Systems, vol. 8, no.1, [6] P. Gibbons and E. Korach, Testing shared memories, SIAM J. Computing, vol. 26, no. 4, REFERENCES [1] T. Kraska, M. Hentschel, G. Alonso, and D. Kossmann, Consistency rationing in the cloud: pay only when it matters, in Proc VLDB. [2] S. Esteves, J. Silva, and L. Veiga, Quality-ofservice for consistency of data geo-replication in cloud computing, Euro-Par 2012 Parallel Processing, vol. 7484, P a g e
Towards secure and consistency dependable in large cloud systems
Volume :2, Issue :4, 145-150 April 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Sahana M S M.Tech scholar, Department of computer science, Alvas institute of
More informationProviding Security and Consistency as a service in Auditing Cloud
Providing Security and Consistency as a service in Auditing Cloud Goka.D.V.S.Seshu Kumar M.Tech Department of CSE Sankethika Vidya Parishad Engineering College G.Kalyan Chakravarthi, M.Tech Assistant Professor
More informationTwo Level Auditing Framework in a large Cloud Environment for achieving consistency as a Service.
Two Level Auditing Framework in a large Cloud Environment for achieving consistency as a Service. Aruna V MTech Student Department of CSE St.Peter s Engineering College, Hyderabad, TS, INDIA N Mahipal
More information[Ahmer*, 4.(6): June, 2015] ISSN: 2277-9655 (I2OR), Publication Impact Factor: 3.785 (ISRA), Journal Impact Factor: 2.114
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY EVALUATION OF CLOUD CONSISTENCY USING AUDITING ALGORITHMS Darakshan Ahmer*, Sameena Banu * Department Of Computer Science & Enigneering,
More informationSecurity related to the information designing or even media editing. This enables users
A Potential Cloud Service by Auditing Cloud MalaimariSuganya.P 1, Padma Priya.R 2 1 Department of Computer Science and Information Technology Nadar Saraswathi College of Arts and Science, Theni dt-625531,
More informationAN EFFECTIVE STUDY ON IMPROVED DATA AUTHENTICATION IN CLOUD SYSTEM
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE AN EFFECTIVE STUDY ON IMPROVED DATA AUTHENTICATION IN CLOUD SYSTEM Bairu Ravi 1, B.Ramya 2 1 M.Tech Student, Dept of CSE, Arjun College
More informationIMPLEMENTATION OF VIRTUAL MACHINES FOR DISTRIBUTION OF DATA RESOURCES
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE IMPLEMENTATION OF VIRTUAL MACHINES FOR DISTRIBUTION OF DATA RESOURCES M.Nagesh 1, N.Vijaya Sunder Sagar 2, B.Goutham 3, V.Naresh 4
More informationPERFORMANCE OF BALANCED STORAGE SERVICES IN CLOUD SYSTEM
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE PERFORMANCE OF BALANCED STORAGE SERVICES IN CLOUD SYSTEM Byagari Kumar 1, K.Pradeep Kumar 2 1 M.Tech Student, Dept of CSE, RRS College
More informationCONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD Ravi Sativada 1, M.Prabhakar Rao 2 1 M.Tech Student, Dept of CSE, Chilkur Balaji
More informationIMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT
IJRRECS/November 2014/Volume-2/Issue-11/3699-3703 ISSN 2321-5461 INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD
More informationEFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM Macha Arun 1, B.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Holy Mary
More informationIMPLEMENTATION OF RELIABLE CACHING STRATEGY IN CLOUD ENVIRONMENT
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE IMPLEMENTATION OF RELIABLE CACHING STRATEGY IN CLOUD ENVIRONMENT M.Swapna 1, K.Ashlesha 2 1 M.Tech Student, Dept of CSE, Lord s Institute
More informationCONSIDERATION OF TRUST LEVELS IN CLOUD ENVIRONMENT
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CONSIDERATION OF TRUST LEVELS IN CLOUD ENVIRONMENT Bhukya Ganesh 1, Mohd Mukram 2, MD.Tajuddin 3 1 M.Tech Student, Dept of CSE, Shaaz
More informationA SIGNIFICANT REDUCTION OF CLOUD STORAGE BY ELIMINATION OF REPETITIVE DATA
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE A SIGNIFICANT REDUCTION OF CLOUD STORAGE BY ELIMINATION OF REPETITIVE DATA M.Rajashekar Reddy 1, B.Ramya 2 1 M.Tech Student, Dept of
More informationIMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION N.Vijaya Sunder Sagar 1, M.Dileep Kumar 2, M.Nagesh 3, Lunavath Gandhi
More informationDISTRIBUTION OF DATA SERVICES FOR CORPORATE APPLICATIONS IN CLOUD SYSTEM
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE DISTRIBUTION OF DATA SERVICES FOR CORPORATE APPLICATIONS IN CLOUD SYSTEM Itishree Boitai 1, S.Rajeshwar 2 1 M.Tech Student, Dept of
More informationADVANCEMENT TOWARDS PRIVACY PROCEEDINGS IN CLOUD PLATFORM
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE ADVANCEMENT TOWARDS PRIVACY PROCEEDINGS IN CLOUD PLATFORM Neela Bhuvan 1, K.Ajay Kumar 2 1 M.Tech Student, Dept of CSE, Vathsalya Institute
More informationA Comparative Study on Privacy-Preserving Public Auditing for Secure Cloud Storage
A Comparative Study on Privacy-Preserving Public Auditing for Secure Cloud Storage Vikram.J 1, M.Kalimuthu 2 PG Scholar, Department of Information Technology, SNS College of Technology, Coimbatore, Tamil
More informationASSURANCE OF PATIENT CONTROL TOWARDS PERSONAL HEALTH DATA
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE ASSURANCE OF PATIENT CONTROL TOWARDS PERSONAL HEALTH DATA Mahammad Zennyfor Sulthana 1, Shaik Habeeba 2 1 M.Tech Student, Dept of CS
More informationDESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE DESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER M.Vishwashanthi 1, S.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Anurag Group
More informationHow To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System
REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India
More informationMANAGING OF IMMENSE CLOUD DATA BY LOAD BALANCING STRATEGY. Sara Anjum 1, B.Manasa 2
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF IMMENSE CLOUD DATA BY LOAD BALANCING STRATEGY Sara Anjum 1, B.Manasa 2 1 M.Tech Student, Dept of CSE, A.M.R. Institute
More informationAN EFFECTIVE PROPOSAL FOR SHARING OF DATA SERVICES FOR NETWORK APPLICATIONS
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFECTIVE PROPOSAL FOR SHARING OF DATA SERVICES FOR NETWORK APPLICATIONS Koyyala Vijaya Kumar 1, L.Sunitha 2, D.Koteswar Rao
More informationCHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM Mohammad Badruzzama Khan 1, Ayesha Romana 2, Akheel Mohammed
More informationIMPROVISATION OF STUDYING COMPUTER BY CLUSTER STRATEGIES
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE IMPROVISATION OF STUDYING COMPUTER BY CLUSTER STRATEGIES C.Priyanka 1, T.Giri Babu 2 1 M.Tech Student, Dept of CSE, Malla Reddy Engineering
More informationCLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE CLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION Akheel Mohammed 1, Dr.Vasumathi 2, Mir Ahmed Ali
More informationSECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK
International Journal of Advance Research In Science And Engineering IJARSE, Vol. No.4, Issue No.01, January 2015 http:// SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK Arudra Gopala Rao
More informationA NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,
More informationA Brief Analysis on Architecture and Reliability of Cloud Based Data Storage
Volume 2, No.4, July August 2013 International Journal of Information Systems and Computer Sciences ISSN 2319 7595 Tejaswini S L Jayanthy et al., Available International Online Journal at http://warse.org/pdfs/ijiscs03242013.pdf
More informationMonitoring Data Integrity while using TPA in Cloud Environment
Monitoring Data Integrity while using TPA in Cloud Environment Jaspreet Kaur, Jasmeet Singh Abstract Cloud Computing is the arising technology that delivers software, platform and infrastructure as a service
More informationEXAMINING OF HEALTH SERVICES BY UTILIZATION OF MOBILE SYSTEMS. Dokuri Sravanthi 1, P.Rupa 2
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE EXAMINING OF HEALTH SERVICES BY UTILIZATION OF MOBILE SYSTEMS Dokuri Sravanthi 1, P.Rupa 2 1 M.Tech Student, Dept of CSE, CMR Institute
More informationNear Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
More informationAN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT Mohd Abdul Shoaib 1, Akheel Mohammed 2, Ayesha 3
More informationData Security Using Reliable Re-Encryption in Unreliable Cloud
ISSN (Online): 2277-5420 www.ijcsn.org Data Security Using Reliable Re-Encryption in Unreliable Cloud 328 1 Ajinkya Adhau, 2 Payal Bobade, 3 Priyanka Zilpe, 4 Yashodhara Fulmali 1, 2, 3, 4 Student, Department
More informationCLOUD COMPUTING SECURITY IN UNRELIABLE CLOUDS USING RELIABLE RE-ENCRYPTION
CLOUD COMPUTING SECURITY IN UNRELIABLE CLOUDS USING RELIABLE RE-ENCRYPTION Chandrala DN 1, Kulkarni Varsha 2 1 Chandrala DN, M.tech IV sem,department of CS&E, SVCE, Bangalore 2 Kulkarni Varsha, Asst. Prof.
More informationA Proposed Framework for Ranking and Reservation of Cloud Services Based on Quality of Service
II,III A Proposed Framework for Ranking and Reservation of Cloud Services Based on Quality of Service I Samir.m.zaid, II Hazem.m.elbakry, III Islam.m.abdelhady I Dept. of Geology, Faculty of Sciences,
More informationSelective dependable storage services for providing security in cloud computing
Selective dependable storage services for providing security in cloud computing Gade Lakshmi Thirupatamma*1, M.Jayaram*2, R.Pitchaiah*3 M.Tech Scholar, Dept of CSE, UCET, Medikondur, Dist: Guntur, AP,
More informationEFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING K.Saipriya 1, A.Ravi Kumar 2 1 M.Tech Student, Dept of
More informationEmail: shravankumar.elguri@gmail.com. 2 Prof, Dept of CSE, Institute of Aeronautical Engineering, Hyderabad, Andhrapradesh, India,
www.semargroup.org, www.ijsetr.com ISSN 2319-8885 Vol.03,Issue.06, May-2014, Pages:0963-0968 Improving Efficiency of Public Cloud Using Load Balancing Model SHRAVAN KUMAR 1, DR. N. CHANDRA SEKHAR REDDY
More informationHow To Create A Multi-Keyword Ranked Search Over Encrypted Cloud Data (Mrse)
JJT-029-2015 SEARCHABLE SYMMETRIC ENCRYPTION METHOD FOR ENCRYPTED DATA IN CLOUD P.Vidyasagar, R.Karthikeyan, Dr.C.Nalini M.Tech Student, Dept of CSE,Bharath University, Email.Id: vsagarp@rediffmail.com
More informationInternational Journal of Engineering Research ISSN: 2348-4039 & Management Technology November-2015 Volume 2, Issue-6
International Journal of Engineering Research ISSN: 2348-4039 & Management Technology Email: editor@ijermt.org November-2015 Volume 2, Issue-6 www.ijermt.org Modeling Big Data Characteristics for Discovering
More informationA Novel Switch Mechanism for Load Balancing in Public Cloud
International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) A Novel Switch Mechanism for Load Balancing in Public Cloud Kalathoti Rambabu 1, M. Chandra Sekhar 2 1 M. Tech (CSE), MVR College
More informationExploring Resource Provisioning Cost Models in Cloud Computing
Exploring Resource Provisioning Cost Models in Cloud Computing P.Aradhya #1, K.Shivaranjani *2 #1 M.Tech, CSE, SR Engineering College, Warangal, Andhra Pradesh, India # Assistant Professor, Department
More informationISSN 2319-8885 Vol.04,Issue.19, June-2015, Pages:3633-3638. www.ijsetr.com
ISSN 2319-8885 Vol.04,Issue.19, June-2015, Pages:3633-3638 www.ijsetr.com Refining Efficiency of Cloud Storage Services using De-Duplication SARA BEGUM 1, SHAISTA NOUSHEEN 2, KHADERBI SHAIK 3 1 PG Scholar,
More informationAN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD Koncha Anantha Laxmi Prasad 1, M.Yaseen Pasha 2, V.Hari Prasad 3 1
More informationA Novel Approach for Efficient Load Balancing in Cloud Computing Environment by Using Partitioning
A Novel Approach for Efficient Load Balancing in Cloud Computing Environment by Using Partitioning 1 P. Vijay Kumar, 2 R. Suresh 1 M.Tech 2 nd Year, Department of CSE, CREC Tirupati, AP, India 2 Professor
More informationDynamic Resource management with VM layer and Resource prediction algorithms in Cloud Architecture
Dynamic Resource management with VM layer and Resource prediction algorithms in Cloud Architecture 1 Shaik Fayaz, 2 Dr.V.N.Srinivasu, 3 Tata Venkateswarlu #1 M.Tech (CSE) from P.N.C & Vijai Institute of
More informationAN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING Ayesha Romana 1, Akheel Mohammed 2, Ayesha 3 1 M.Tech Student, Dept
More informationMINING THE DATA FROM DISTRIBUTED DATABASE USING AN IMPROVED MINING ALGORITHM
MINING THE DATA FROM DISTRIBUTED DATABASE USING AN IMPROVED MINING ALGORITHM J. Arokia Renjit Asst. Professor/ CSE Department, Jeppiaar Engineering College, Chennai, TamilNadu,India 600119. Dr.K.L.Shunmuganathan
More informationMulti-level Metadata Management Scheme for Cloud Storage System
, pp.231-240 http://dx.doi.org/10.14257/ijmue.2014.9.1.22 Multi-level Metadata Management Scheme for Cloud Storage System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3, Chuck Yoo 2 and Young Woong Ko 1
More informationSecure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Twinkle Graf.F 1, Mrs.Prema.P 2 1 (M.E- CSE, Dhanalakshmi College of Engineering, Chennai, India) 2 (Asst. Professor
More information2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment
R&D supporting future cloud computing infrastructure technologies Research and Development on Autonomic Operation Control Infrastructure Technologies in the Cloud Computing Environment DEMPO Hiroshi, KAMI
More informationHow To Manage Cloud Hosted Databases From A User Perspective
A support for end user-centric SLA administration of Cloud-Hosted Databases A.Vasanthapriya 1, Mr. P. Matheswaran, M.E., 2 Department of Computer Science 1, 2 ABSTRACT: Service level agreements for cloud
More informationMANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS Kanchupati Kondaiah 1, B.Sudhakar 2 1 M.Tech Student, Dept of CSE,
More informationManaging Documents with NoSQL in Service Oriented Architecture
Managing Documents with NoSQL in Service Oriented Architecture Milorad P. Stević, The Higher Education Technical School of Professional Studies, Novi Sad, Serbia, milorad.stevic@live.com Abstract The need
More informationAN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
More informationEffective Load Balancing Based on Cloud Partitioning for the Public Cloud
Effective Load Balancing Based on Cloud Partitioning for the Public Cloud 1 T.Satya Nagamani, 2 D.Suseela Sagar 1,2 Dept. of IT, Sir C R Reddy College of Engineering, Eluru, AP, India Abstract Load balancing
More informationStreamStorage: High-throughput and Scalable Storage Technology for Streaming Data
: High-throughput and Scalable Storage Technology for Streaming Data Munenori Maeda Toshihiro Ozawa Real-time analytical processing (RTAP) of vast amounts of time-series data from sensors, server logs,
More informationKeywords : audit, cloud, integrity, station to station protocol, SHA-2, third party auditor, XOR. GJCST-B Classification : C.2.4, H.2.
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 3 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationIndex Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving
More informationMinimize Response Time Using Distance Based Load Balancer Selection Scheme
Minimize Response Time Using Distance Based Load Balancer Selection Scheme K. Durga Priyanka M.Tech CSE Dept., Institute of Aeronautical Engineering, HYD-500043, Andhra Pradesh, India. Dr.N. Chandra Sekhar
More informationINTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) PERCEIVING AND RECOVERING DEGRADED DATA ON SECURE CLOUD
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,
More informationDistributed Framework for Data Mining As a Service on Private Cloud
RESEARCH ARTICLE OPEN ACCESS Distributed Framework for Data Mining As a Service on Private Cloud Shraddha Masih *, Sanjay Tanwani** *Research Scholar & Associate Professor, School of Computer Science &
More informationImproving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
More informationData Integrity for Secure Dynamic Cloud Storage System Using TPA
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure
More informationPublic Auditing for Shared Data in the Cloud by Using AES
Public Auditing for Shared Data in the Cloud by Using AES 1 Syagamreddy Subbareddy, 2 P.Tejaswi, 3 D.Krishna 1 M.Tech(CSE) Pursuing, 2 Associate Professor, 3 Associate Professor,HOD, 1,2,3 Dept. of Computer
More informationExpressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage Abstract: Cloud computing is one of the emerge technologies. To protect the data and privacy of users the access
More informationA Reputation Replica Propagation Strategy for Mobile Users in Mobile Distributed Database System
A Reputation Replica Propagation Strategy for Mobile Users in Mobile Distributed Database System Sashi Tarun Assistant Professor, Arni School of Computer Science and Application ARNI University, Kathgarh,
More informationSecure Cloud Transactions by Performance, Accuracy, and Precision
Secure Cloud Transactions by Performance, Accuracy, and Precision Patil Vaibhav Nivrutti M.Tech Student, ABSTRACT: In distributed transactional database systems deployed over cloud servers, entities cooperate
More informationDevelopment of enhanced Third party Auditing Scheme for Secure Cloud Storage
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,
More informationOptimal Multi Server Using Time Based Cost Calculation in Cloud Computing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,
More informationDetection of Distributed Denial of Service Attack with Hadoop on Live Network
Detection of Distributed Denial of Service Attack with Hadoop on Live Network Suchita Korad 1, Shubhada Kadam 2, Prajakta Deore 3, Madhuri Jadhav 4, Prof.Rahul Patil 5 Students, Dept. of Computer, PCCOE,
More informationSecure Data transfer in Cloud Storage Systems using Dynamic Tokens.
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering
More informationOPTIMIZED AND INTEGRATED TECHNIQUE FOR NETWORK LOAD BALANCING WITH NOSQL SYSTEMS
OPTIMIZED AND INTEGRATED TECHNIQUE FOR NETWORK LOAD BALANCING WITH NOSQL SYSTEMS Dileep Kumar M B 1, Suneetha K R 2 1 PG Scholar, 2 Associate Professor, Dept of CSE, Bangalore Institute of Technology,
More informationTwo-Level Metadata Management for Data Deduplication System
Two-Level Metadata Management for Data Deduplication System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3.,Young Woong Ko 1 1 Dept. of Computer Engineering, Hallym University Chuncheon, Korea { kongjs,
More informationA FRAMEWORK FOR SECURE ACCESS OF HEALTH DATA WITH AUDIT ABILITY IN CLOUD
A FRAMEWORK FOR SECURE ACCESS OF HEALTH DATA WITH AUDIT ABILITY IN CLOUD Ch. Kousalya Devi 1, B Dada Khalande 2, G.Rama Subba Reddy 3 1 M.tech Scholar (CSE), 2 Asst.Professor, Dept. of CSE, Vignana Bharathi
More informationFault Tolerance Techniques in Big Data Tools: A Survey
on 21 st & 22 nd April 2014, Organized by Fault Tolerance Techniques in Big Data Tools: A Survey Manjula Dyavanur 1, Kavita Kori 2 Asst. Professor, Dept. of CSE, SKSVMACET, Laxmeshwar-582116, India 1,2
More informationPublic Cloud Partition Balancing and the Game Theory
Statistics Analysis for Cloud Partitioning using Load Balancing Model in Public Cloud V. DIVYASRI 1, M.THANIGAVEL 2, T. SUJILATHA 3 1, 2 M. Tech (CSE) GKCE, SULLURPETA, INDIA v.sridivya91@gmail.com thaniga10.m@gmail.com
More informationInternational Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationADVANCE SECURITY TO CLOUD DATA STORAGE
Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next
More informationA Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor
I J C International Journal of lectrical, lectronics ISSN No. (Online): 2277-2626 and Computer ngineering 3(2): 144-148(2014) A Review of Cloud nvironment and Recognition of Highly Secure Public Data Verification
More informationHow To Create A Privacy Preserving And Dynamic Load Balancing System In A Distributed System
Enforcing Secure and Privacy-Preserving Information Brokering with Dynamic Load Balancing in Distributed Information Sharing. 1 M.E. Computer Engineering Department GHRCEM, Wagholi, Pune. Jyotimore2283@gmail.com
More informationEntropy-Based Collaborative Detection of DDoS Attacks on Community Networks
Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Krishnamoorthy.D 1, Dr.S.Thirunirai Senthil, Ph.D 2 1 PG student of M.Tech Computer Science and Engineering, PRIST University,
More informationScheduling Allowance Adaptability in Load Balancing technique for Distributed Systems
Scheduling Allowance Adaptability in Load Balancing technique for Distributed Systems G.Rajina #1, P.Nagaraju #2 #1 M.Tech, Computer Science Engineering, TallaPadmavathi Engineering College, Warangal,
More informationSEARCH ENGINE WITH PARALLEL PROCESSING AND INCREMENTAL K-MEANS FOR FAST SEARCH AND RETRIEVAL
SEARCH ENGINE WITH PARALLEL PROCESSING AND INCREMENTAL K-MEANS FOR FAST SEARCH AND RETRIEVAL Krishna Kiran Kattamuri 1 and Rupa Chiramdasu 2 Department of Computer Science Engineering, VVIT, Guntur, India
More informationDELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.
More informationRanking of Cloud Services Using Cumulative Sum Method
Journal of Computer Science and Applications. ISSN 2231-1270 Volume 6, Number 2 (2014), pp. 99-105 International Research Publication House http://www.irphouse.com Ranking of Cloud s Using Cumulative Sum
More informationHow To Make A Secure Storage On A Mobile Device Secure
Outsourcing with secure accessibility in mobile cloud computing Monika Waghmare 1, Prof T.A.Chavan 2 Department of Information technology, Smt.Kashibai Navale College of Engineering, Pune, India. Abstract
More informationIdentifying Data Integrity in the Cloud Storage
www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and
More informationA Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network
A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network Parama Bhaumik 1, Somprokash Bandyopadhyay 2 1 Dept. of Information Technology, Jadavpur
More informationA Game Theoretic Approach for Cloud Computing Infrastructure to Improve the Performance
P.Bhanuchand and N. Kesava Rao 1 A Game Theoretic Approach for Cloud Computing Infrastructure to Improve the Performance P.Bhanuchand, PG Student [M.Tech, CS], Dep. of CSE, Narayana Engineering College,
More informationSecure Way of Storing Data in Cloud Using Third Party Auditor
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.
More informationEfficient Parallel Distributed Load Balancing in Content Delivery Networks
Efficient Parallel Distributed Load Balancing in Content Delivery Networks P.Jyothi*1, N.Rajesh*2, K.Ramesh Babu*3 M.Tech Scholar, Dept of CSE, MRECW, Maisammaguda, Secunderabad, Telangana State, India,
More informationEfficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage
Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage Priyanga.R 1, Maheswari.B 2, Karthik.S 3 PG Scholar, Department of CSE, SNS College of technology, Coimbatore-35,
More informationA Trust Evaluation Model for QoS Guarantee in Cloud Systems *
A Trust Evaluation Model for QoS Guarantee in Cloud Systems * Hyukho Kim, Hana Lee, Woongsup Kim, Yangwoo Kim Dept. of Information and Communication Engineering, Dongguk University Seoul, 100-715, South
More informationCloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
More informationOptimal Service Pricing for a Cloud Cache
Optimal Service Pricing for a Cloud Cache K.SRAVANTHI Department of Computer Science & Engineering (M.Tech.) Sindura College of Engineering and Technology Ramagundam,Telangana G.LAKSHMI Asst. Professor,
More informationCyber Forensic for Hadoop based Cloud System
Cyber Forensic for Hadoop based Cloud System ChaeHo Cho 1, SungHo Chin 2 and * Kwang Sik Chung 3 1 Korea National Open University graduate school Dept. of Computer Science 2 LG Electronics CTO Division
More informationA Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification
Research Journal of Applied Sciences, Engineering and Technology 7(14): 2946-2953, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 7, 2013 Accepted: August
More informationIMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE
IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE 1 Rajesh L Gaikwad, 2 Dhananjay M Dakhane, 3 Ravindra L Pardhi M.E Student, Associate Professor, Assistant Professor,
More information