International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015.
|
|
- Lily Collins
- 8 years ago
- Views:
Transcription
1 Literature Survey On Cloud Data Recovery Techniques. Mrs. D.A Phalke, Onkar Kulkarni, AbhijitFulsagar,HarishRane, AjinkyaChothave Department of Computer Engineering, D.Y.Patil College of Engineering, Akurdi, Pune , Maharashtra, India. ABSTRACT -The cloud computing is increasing day by day as its advantages overcome the disadvantage of various early computing techniques. Cloud provides online data storage where data is stored. If in case, file deletion or if the cloud gets destroyed due to any reason the data stored at cloud gets lost. Hence to overcome this problem various data recovery techniques have been developed in cloud computing. In this literature paper, we explore some existing techniques that are previously implemented to tackle this problem. The objective of this paper is to give the brief explanation of the existing techniques. Keywords- Parity Cloud Service (PCS), Semantic Overlay Network (SON), Seed Block (Si), Virtual Cloud Manager (VCM), etc. I. INTRODUCTION In today s world, cloud computing is most exciting technologies because of its capacity to reduce cost associated with computing while increasing flexibility and scalability [1].The data available from the various sources is huge and in the electronic form. So to store this data requires lots of volume of data storage devices. Hence consumers usually prefer to store data on the cloud. If the cloud gets corrupted or damaged or if file deletion happens accidentally by consumer, which leads to loss of important data. Thus back-up of the uploaded data must be taken and if loss of data happens we can recover that data from the data back-up. Considering this situation, many techniques have been developed is cloud computing to recover the data such as HSDRT [4], ERGOT [6], PCS [5], Rent out Resource Service [7], old/hot backup strategy, Linux Box etc [1][2]. The performance of these techniques is based on level of complexity of implementation, cost of implementation, reliability, data backup limit, security, privacy etc. A. Cloud Cloud is basically a combination of servers at very high level. The combination of servers is virtually said to be in space, so it is called as cloud. The job is to store data. As cloud is combination of various servers, thus its storing capacity is also very high and with it many issues also arises with it such as security, performance, easiness, etc. B. Data Backup Server As the name suggests, it is similar to normal server, wherein data is stored. It is called as data backup server because, originally data is stored at main server and from there it is stored at another server which acts like backup server. C. Data Back-Up Server In Cloud , IJAFRC and NCRTIT 2015 All Rights Reserved
2 Here implementation takes place at very high level. Since many users now opt for cloud to store their data, thus it is important to provide security and backup. Backup because if cloud gets destroyed due to any reason then client/user can retrieve their data back. Thus whatever data is stored at cloud of n no of clients; whole of that data is stored at another server called as data backup server. Cloud computing provides on demand resources to the consumer as it requires the management of resources among each and every client/user [3]. Such management includes various aspects of proper utilization of the resources. The resources can be any hardware or software. Cloud computing must be able to provide reliability such that users can upload their sensitive and important data. The cost-effective approach is the main concern while implementing any cloud. During the study of cloud computing, we found various advantages of it. In its positive points, we found that the cloud is capable enough to store the huge amount of data of various different clients with complete security such that Internet Service Provider (ISP) provides a huge storage in a cloud to the user client and users are allow safely to upload there private and important data to the main cloud. And at the same time we found critical issue regarding this storage i.e. if any of the client s data is missing or disappeared for some reason or the cloud get destroyed either due to any natural hazardous things like flood, earthquake etc. then for back-up and recovery consumer/client has to depend on service provider which means the data has to be stored in the server. To overcome this problem, it requires an efficient technique for data backup and recovery so that the client can able to contact the backup server where private data is stored with high reliability and whenever a main cloud fails to provide the user s data. These techniques must possess the low cost of implementation and can easily recover the data after any disaster. That s why, the need of the back-up and recovery techniques for cloud computing arises due to heavy storage of its clients. II. DATA RECOVERY TECHNIQUES There was many data recovery techniques in cloud computing. They are as follows: A. HS-DRT The HS-DRT file backup mechanism has three principal components as shown in figure and those are Data Centre, Supervisory Server and various client nodes [4]. Figure 1 The Basic Configuration Of HS-DRT System The basic procedure is as follows: , IJAFRC and NCRTIT 2015 All Rights Reserved
3 1. Backup sequence: When the Data Centre receives the data which is to be backed up, it encrypts it, scrambles it, and divides it into fragments, and thereafter replicates the data. The Data Centre encrypts the fragments again in the second stage and distributes them to the client nodes in a random order. At the same time, the Data Centre sends the metadata used for deciphering the series of fragments to the Supervisory Server. The metadata comprises encryption keys (for both the first and second stages), and several items of information related to fragmentation, replication, and distribution. 2. Recovery sequence: When a disaster occurs, the Supervisory Server initiates the recovery sequence. The Supervisory Server collects the encrypted fragments from various appropriate clients in a manner similar to a rake reception procedure. Then they are decrypted, merged, and descrambled in the reverse order of that performed at the Data Centre and the decryption is then complete. Thus, the Supervisory Server can recover the original data that has been backed-up. 3. Security Level of HS-DRT: The Security level of the HS-DRT depends on spatial scrambling, fragmentation/replication, and the shuffling algorithm. Because of these three factors, nobody is able to decrypt without collecting all relevant fragments, selecting a unique set of fragments, and sorting the fragments into the correct order. Even if some fragments are intercepted, nobody is able to decrypt parts of the original data from such fragments. i. Spatial scrambling: The spatial scrambling procedure can be implemented using C simple algorithm. for (i=1;i<imax;i++) {buf[i]=buf[i]+buf[i-1];} buf [0] =buf[0] +buf[imax-1]; The array buf [] consist of data to be scrambled and imax is the size of the buf array. This computation process should be repeated at least six times. To descramble, it is only necessary to perform the same operations in the reverse order. By using spatial scrambling technology, it is almost impossible for a third party to decipher the data by comparing and combining the encrypted fragments. ii. Fragmentation/replication: Fragmentations means dividing data in small pieces. Even if a hacker captured all raw packets between the data centre and the client nodes, it would be extremely difficult to assemble all the packets in the correct order, and to determine whether all packets are there are not. Also, the proposed backup mechanism replicates each fragment and encrypts each copy of the fragment with a different encryption key. So even if a pair of encrypted fragments is the available different encryption key is required to decrypt the data. iii. Shuffling: HS-DRT mainly uses a shuffling method with pseudorandom number generators for the distribution to the client nodes. Distribution of encrypted fragments is done in a shuffled order, since we predetermine the destination client nodes from the shuffled table in advance. B. Parity Cloud Service (PCS) Parity cloud service is the technique based on parity recovery service [5].PCS has low cost of recovery and recovers data with high probability. For data backup, PCS creates the virtual disk in users system for , IJAFRC and NCRTIT 2015 All Rights Reserved
4 data backup, make parity groups and store parity data of group in cloud. The PCS algorithm works using Exclusive OR for creating parity information. 1. Initial parity generation: First the seed block (Si) is generated for virtual disk of client. PCS server sends the initialize message to each Recovery Manager in the group. After sending the message, the server sends temporary random block (r) to the first node. After receiving the r block, the first node generates an intermediate parity block via r Exclusive-OR S1 and sends it to its successor, 2nd node. Then second node generates an intermediate parity block via XORing the received parity block with its seed block, S2, and sends it to its successor, third node and so on. The final block transferred to the PCS server from node 4 is XORed with the temporary random block, r, again, to generate the seed parity block across all seed blocks (((((r Exclusive-OR S1) Exclusive-OR S2)Exclusive-OR S3) Exclusive-OR S4) r = S1 Exclusive-OR S2Exclusive-OR S3Exclusive-OR S4). For each group the initialization process occur only at once. 2. Parity Block Update: The Manager in PCS agent maintains map to indicate whether the parity block for each data block in the virtual disk has been generated or not which is parity generation bitmap (PG-bitmap).All fields of bitmap is initialized (set to 0) after the initialization process for any data block in the virtual disk. The PG-bitmap is referred when a parity block is updated. When a block (Bold) in node is to be updated to a new block (Bnew), the Storage Manager refers to the corresponding value in the PG-bitmap. If it is 0, then the Storage Manager generates an intermediate parity block (Pt) by XORing the new block with the seed block (Pt = BnewSi), and set the corresponding value in the PG-bitmap to 1. Otherwise, the intermediate parity block is generated by XORing the new block and the old block (Pt = Bnew-Bold). For each VDPG, the PCS server also maintains the PG-bitmap. 3. Data Block Recovery: When a data block is corrupted, it can be recovered using the parity block provided by the PCS server and encoded data blocks provided by other nodes in the parity group. Assume that the n-th data block in nodei, Bin, has been corrupted. Nodei sends a recovery request message to the PCS server. On receiving the recovery request message, the PCS server identifies to which VDPG the node belongs to and reads the corresponding parity block, Pn. Then, it generates a temporary random block, r, and a temporary parity block, Pr, for recovery process. When the size of the VDPG is even, Pr= Pnr. Otherwise, Pr= Pn. The PCS server sends Pr along with the list of nodes that will send their encoded data block to nodei for recovery along with the IP address of nodei to all other nodes in the group. If there are any off-line nodes, the PCS server sends the message when they become on-line. On receiving the message, each node generates their own encoded data block, E, by XORing the n-the data block with r (Ej = Bin r, for each node j VDPG, j i) and sends to nodei. Then, the nodei recovers the corrupted data block by Bin = PrE1 Ei-1 Ei+1 E VDPG. C. ERGOT The increasing demands for online services needs distributed architecture for promoting its scalability and semantics to enable to their efficient retrieval [6]. So by using two different approaches towards goal are Semantic Overlay Network (SON) and Distributed Hash Tables (DHT). Semantic based discovery is done in distributed infrastructure such as grids and clouds. By combining SON and DHT, ERGOT (Efficient routing grounded on taxonomy) is introduced. ERGOT takes advantage in two ways first is services are advertised in DHT on basis of their annotations and , IJAFRC and NCRTIT 2015 All Rights Reserved
5 another one is annotations enable semantic based service match making, so these approaches enables us for accuracy of search and network traffic. Service oriented architecture (SOA) paradigm is model for modular composition and reuse of third party software component on large scale. SOA model aims that the developers can dynamically discover and assemble software module to fulfil their needs. As an example, think a user is looking for a service that offers car-selling information. A possibly provided service description request may add terms such as price, vehicle model, year and so forth. Using Chord, relevant services would only be retrieved if their semantic profiles have exactly the same keywords that used in the query. However, it can be perfect possible that in the specifications related terms are used instead, for instance automobile instead of car and car type instead of car model. In this case session, ERGOT s semantic similarity approach will still be able to return correct relevant services, while Chord would face failure to find any matches related to that. We have explored the viability of these ideas in the particular case where peers are autonomous and distributed semantic service registries. D. Rent Out The Rented Resourses The architecture of Virtual Cloud is a client-server model. It consists of two main components i.e. Virtual Cloud Manager (VCM) and Host Manager (HM)[7]. Virtual Cloud Manager is a server type component, functioning on the cloud vendor s infrastructure. Host Manager is a component installed at each host machine. 1. Virtual Cloud Manager: Virtual cloud manager consists of 3 layers i.e. Client Service API, Virtual Cloud Middleware and Communication Layer. Figure 2. Interaction model for Virtual Cloud Service Utilization a. Client Service API: Client service API is an interface layer to the Virtual Cloud Middleware. It enables different clients to request different types of services from Virtual Cloud Manager. It understands different types of messages and service requests , IJAFRC and NCRTIT 2015 All Rights Reserved
6 b. Virtual Cloud Middleware: Virtual Cloud Middleware is the core part of the Virtual Cloud Manager. The functionality of these components is given below. c. Distributor: It is the central point of the Virtual Cloud Middleware and is responsible for task assignment and communication among all its components. It receives a request from a client through client service API and route it to the appropriate component responsible for the desired task. d. AAA Server: It is a module responsible for the Authentication, Authorization, and Auditing of the clients. Authentication is required to use the cloud service. It verifies the correct use of services and resources by the users. e. Metering Service: It is an accounting service for both the users and hosts. It calculates the billing for the users on the basis of account and metering settings. User can choose among different types of packages depending upon his needs and offers made by virtual cloud vendor. It also calculates the billing for hosts on the basis of type of contract and resource utilization. f. Client Directory: All the users/clients information is registered in the user directory. g. Service Directory: It keeps the record of the available cloud services at a particular time. h. Resource Directory: It keeps record of all the hosts and the information about their infrastructure resources. It also has a record of resources from other cloud vendors. i. Host Controller: It is responsible for managing the hosts. It has a capability to perform certain node management tasks, including the node creation, termination, assignment/acquisition, release etc. j. Federation Manager/Service: It is responsible for cross-cloud connection with other virtual cloud vendors. It has the record about all the cloud vendors in its federation. It has two main tasks to do. The first is to periodically advertise its own shareable resources and services to the other cloud vendors in its federation. The second task is to receive advertisements from the other virtual cloud vendors for their available resources. It records the details about the resources into the Resource Directory and details about the services in the Service Directory. Federation Manager uses the Instant Messaging and Presence Service (IMPS) protocol to advertise its resources. If the desired resource is not available locally within the Virtual Cloud then federation manager requests its peer federation manager located on the remote Virtual Cloud for the resources. k. Logging Service: It is responsible for keeping record of all the events occurring in the VCM manager. 2. Communication Layer: Communication layer is responsible for communication with the clients, hosts and possibly with other VCM in case of cross-cloud federation. It is also understand different communication protocols and technologies , IJAFRC and NCRTIT 2015 All Rights Reserved
7 a. Host Manager: It creates a virtualized environment with the help of a hypervisor, to provide a set of cloud services. It has three components i.e. Metering Service Sensor, Communication Layer and Low Level Services. b. Metering Service Sensor: It is responsible for the accounting of resource usage. Metering Service at VCM does the billing for the user on the basis of this information. c. Communication Layer: Communication layer is responsible for communication with the clients, Virtual Cloud Manager, and other hosts d. Low Level Services: It is responsible for interaction with the external environment of the host manager. e. Execution Process: o Client first request for a service to virtual cloud vendor. o The request is first forwarded through Client Service API, which allows the access from different types of client platforms and message formats. o Then the request if send to distributor, which checks the service validity (in which domain service lies and it can be provided at time or not). o Then authentication of user. o Then it checks from the resource directory that where the resource for the particular service does exists. o If the Distributor manages to find a resource to perform the task, it asks the Host controller to assign a host node to the service. But if the Distributor cannot find an existing resource/host for the service, then it asks the Host Controller to first create/register a host node and then assign that host to the service. o Host node creation and termination record is updated in the Resource Directory and host assignment and release is updated in Metering Service. o At the time of service assignment, a unique service assignment ID (SaID) is generated, which shows that a particular client is using a particular service. o If the distributor fails to find an existing resource or to create a new host then it asks federation manager to contact the remote federation manager for a service assignment. o Host node serves the required service to the client/user, on the basis of service request from the VCM. It creates a direct communication link with the client and uses the SaID for reference. When a client wants to finish the service utilization, it asks the VCM. Host controller at VCM requests the host node to terminate the service and it releases the node from the service. Then distributor updates the resource directory that the node has been released and also informs metering service to stop servicing. III. VARIOUS TOOLS USED FOR CLOUD DISASTER RECOVERY There are various tools which helps in data recovery, and those are as follows [8]: 1. AppSim: Internet Level application and efficiently used for multitenant nonfunctional requirement. 2. Google App Engine: Google App Engine is a Java and Python based platform that affords web application, resource storage and application hosting, data storage. 3. OpenNebula: It is open source toolkit which makes public, private, and hybrid cloud. This tool support VM migration , IJAFRC and NCRTIT 2015 All Rights Reserved
8 4. CloudSim: Enable modeling and simulation. It also creates virtual machine. 5. Cloud Analyst: Cloud Analyst is competent produces graphical output results of simulation in the form charts and tables. The advantage of this tool is that it supports Virtualization. 6. Open stack: This is suitable for Public and Hybrid cloud. The tool is progressing with improvements to support wide of requests from the growing user community. Table 1.Comparison between different approaches S.N Approach Advantage Disadvantage 1 HSDRT This technique can be used by movable clients like Smartphone s, laptop etc. High implementation cost. 2 Parity service cloud Provides reliable service Privacy to data Low implementation cost High Implementation complexity 3 ERGOT Fast and exact match data retrieval Privacy to data High time and implementation complexity 4 Rent out the Rented Resources Cost depends on infrastructure utilization Implementation gets complex Resources must be kept under special attention due to rented concept IV. CONCLUSION Thus conclusion is PCS generates a virtual disk in user system for data backup, make parity groups across virtual disk, and store parity data of parity group in cloud. It uses the Exclusive OR () for creating Parity information. It is comparatively reliable, simple, easy to use and more convenient for data recovery, but it contains complexities. HS-DRT provides an efficient way for movable clients but fails to manage implementation cost. It effectively uses wide distributed data transfer mechanism and high encryption. ER-GOT is based on the semantic analysis and unable to focus on time and implementation complexity. Rent out the Rented Resources is based on renting the resources to clients in form of cloud service. V. REFERENSES [1] Ms. Kruti Sharma, Prof. Kavita R Singh, Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing, 2013 International Conference on Communication Systems and Network Technologies. [2] Ms..KrutiSharma,ProfK.R.Singh, 2012, Online data Backup And Disaster Recovery techniques in cloud computing:a review, IJEIT, Vol.2, Issue , IJAFRC and NCRTIT 2015 All Rights Reserved
9 [3] ChintureenaThingom, Cloud Disaster Management With Scheduling Strategy, International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE) Volume 3, Issue 5, May 2014, ISSN: [4] Yoichiro Ueno, NoriharuMiyaho, Shuichi Suzuki,MuzaiGakuendai, Inzai-shi, Chiba,Kazuo Ichihara, Performance Evaluation of a Disaster Recovery System and Practical Network System Applications, Fifth International Conference on Systems and Networks Communications, 2010, pp [5] Chi-won Song, Sungmin Park, Dong-wook Kim, Sooyong Kang, 2011, Parity Cloud Service: A Privacy-Protected Personal Data Recovery Service, International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11. [6] Giuseppe Pirr o, Paolo Trunfio, Domenico Talia, Paolo Missier and Carole Goble, 2010, ERGOT: A Semantic-based System for Service Discovery in Distributed Infrastructures, 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing. [7] Sheheryar Malik, FabriceHuet, 2011, Virtual Cloud: Rent out the Rented Resourses, 6th IEEE International Conference for Internet Technology and Secured Transactions (ICITST-2011). [8] ChintureenaThingom, A Study on Tools for Cloud Disaster Management, International Journal of Interdisciplinary and Multidisciplinary Studies (IJIMS), 2014, Vol 1, No.4, , IJAFRC and NCRTIT 2015 All Rights Reserved
How To Create A Backup And Backup Algorithm In Cloud (Cloud)
A SMART DATA BACKUP TECHNIQUE IN CLOUD COMPUTING USING SIGNCRYPTION Sridevi.N. 1, Ashwini.A 2 1 Asst.Professor,, Dept of CSE,SVCE,Bengaluru, n.sridevi5@gmail.com 2 PG Student Dept of CSE,SVCE,Bengaluru,
More informationA Review on Data Back-up Techniques for Cloud Computing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,
More informationPrivacy Preserving Public Auditing For Secure Cloud Storage
Privacy Preserving Public Auditing For Secure Cloud Storage V. Lakshmikanth, K. Sreekanth # Student of M.Tech, Computer science and engineering in Vaagdevi Institute of Technology and Sciences, Proddatur,
More informationData Recovery in Cloud Environment Using Seed Block Algorithm
Data Recovery in Cloud Environment Using Seed Block Algorithm 1 Vedashree N, 2 Praveen Kumar KC, 3 Anilkumar G 1 PG Student Dept. Of CS&E, 2 PG Student Dept. Of CS&E, 3 Associate professor Dept. Of CS&E
More information241 P a g e. Keywords: - Seed Block Algorithm, AES, Cloud back-up, Remote cloud, Main Cloud
INTELLIGENT CLOUD SECURITY BACK-UP SYSTEM Tanay Kulkarni 1, Sumit Memane 2, Onkar Nene 3, Krupali Dhaygude 4 Students of Department of Computer Engineering, RMD Sinhgad School of Engineering, Pune, Maharashtra,
More informationData Security and Privacy in Cloud using RC6 Algorithm for Remote Data Back-up Server
Data Security and Privacy in Cloud using RC6 Algorithm for Remote Data Back-up Server Ruchira. H. Titare 1, Prof. Pravin Kulurkar 2, 1 2nd year Mtech CSE, Vidarbha Institute of Technology, Nagpur, India,
More informationIntelligent Cloud Back-Up System
International Journal of Emerging Engineering Research and Technology Volume 2, Issue 7, October 2014, PP 82-89 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Intelligent Cloud Back-Up System Tanay Kulkarni
More informationREDUSING THE STORAGE SIZE USING COMPRESSION ALGORITHM AND CLOUD BACKUP USING EXOR
REDUSING THE STORAGE SIZE USING COMPRESSION ALGORITHM AND CLOUD BACKUP USING EXOR 1 S. N. Uke, 2 Mohini Shinde, 3 Shweta Joshi, 4 Priya Sharma, 5 Rushikesh Rathod 1 Assistant Professor,Smt. Kashibai Navale
More informationSEED BLOCK ALGORITHM: A REMOTE SMART DATA BACK-UP TECHNIQUE FOR CLOUD COMPUTING
SEED BLOCK ALGORITHM: A REMOTE SMART DATA BACK-UP TECHNIQUE FOR CLOUD COMPUTING Vijayalaxmi V Kadlimatti 1, Ramesh Kumar H K 2 1 M.Tech Student, 2 Assistant Professor, Dept. of Computer Science and Engineering,
More informationISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 5, November 2012
Online Data Back-up and Disaster Recovery Techniques in Cloud Computing: A Review Kruti Sharma, Kavita R Singh Computer Science Engineering, YCCE, Nagpur (M.S), 441 110, India Abstract Today, in electronic
More informationA smart data backup technique for cloud computing using seed block algorithm strategy
A smart data backup technique for cloud computing using seed block algorithm strategy Mr. G. S. Narke 1 Mr. A. K. Harijan 2 Mr. A. R. Shinde 3 Prof.H.D.Sonawane 4 ---------------------------------------------------------------------***---------------------------------------------------------------------
More informationSecure Data Back-up Technique for Cloud Computing using Seed Block Algorithm with RSA Encryption
Secure Data Back-up Technique for Cloud Computing using Seed Block Algorithm with RSA Encryption Mrs. Priyanka Patil SIT Lonavala, SPPU Maharashtra, INDIA Prof. Vikas Kadam SIT Lonavala, SPPU Maharashtra,
More informationSeed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing
2013 International Conference on Communication Systems and Network Technologies Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing Ms. Kruti Sharma Department of Computer Technology,
More informationIJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 01, 2015 ISSN (online): 2321-0613
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 01, 2015 ISSN (online): 2321-0613 Data Recovery Technique using Seed Block Algorithm for Cloud Computing J.Sangeetha Priya
More informationHow To Backup A Cloud Server With Seed Block Algorithm
R. V. Gandhi et al Int. Journal of Engineering Research and Applications RESEARCH ARTICLE OPEN ACCESS Data Back-Up and Recovery Techniques for Cloud Server Using Seed Block Algorithm R. V. Gandhi 1, M
More informationKeywords-Main cloud; Backup; Parity Cloud Service; Seed Block; Complexity; HSDRT;
Volume 5, Issue 2, February 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Disaster Recovery
More informationSmart Data Back-up Technique for Cloud Computing using Secure Erasure Coding
Smart Data Back-up Technique for Cloud Computing using Secure Erasure Coding Kolipaka Kiran 1, Janapati Venkata Krishna 2 1 pursuing M.Tech (CSE), 2 Associate Professor & HOD (CSE Department) 1,2 Holy
More informationSync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 4, July-Aug 2014
RESEARCH ARTICLE An Efficient Service Broker Policy for Cloud Computing Environment Kunal Kishor 1, Vivek Thapar 2 Research Scholar 1, Assistant Professor 2 Department of Computer Science and Engineering,
More informationCloud Computing - Architecture, Applications and Advantages
Cloud Computing - Architecture, Applications and Advantages 1 Arun Mani Tripathi 2 Rizwan Beg NIELIT Ministry of C&I.T., Govt. of India 2 Prof. and Head, Department 1 of Computer science and Engineering,Integral
More informationA Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University
More informationKeyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
More informationWeb-Based Data Backup Solutions
"IMAGINE LOSING ALL YOUR IMPORTANT FILES, IS NOT OF WHAT FILES YOU LOSS BUT THE LOSS IN TIME, MONEY AND EFFORT YOU ARE INVESTED IN" The fact Based on statistics gathered from various sources: 1. 6% of
More informationImproving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
More informationEfficient Backingup Data for Migrating Cloud to Cloud
Efficient Backingup Data for Migrating Cloud to Cloud 1 PS.Vijayabaskaran, Assistant Professor, Department of Information Technology, Sri Manakula Vinayagar Engineering College, Pondicherry, India. 2 U.Prabu,
More informationUsing Peer to Peer Dynamic Querying in Grid Information Services
Using Peer to Peer Dynamic Querying in Grid Information Services Domenico Talia and Paolo Trunfio DEIS University of Calabria HPC 2008 July 2, 2008 Cetraro, Italy Using P2P for Large scale Grid Information
More informationProject Proposal. Data Storage / Retrieval with Access Control, Security and Pre-Fetching
1 Project Proposal Data Storage / Retrieval with Access Control, Security and Pre- Presented By: Shashank Newadkar Aditya Dev Sarvesh Sharma Advisor: Prof. Ming-Hwa Wang COEN 241 - Cloud Computing Page
More informationMultilevel Communication Aware Approach for Load Balancing
Multilevel Communication Aware Approach for Load Balancing 1 Dipti Patel, 2 Ashil Patel Department of Information Technology, L.D. College of Engineering, Gujarat Technological University, Ahmedabad 1
More informationImplementation of Reliable Fault Tolerant Data Storage System over Cloud using Raid 60
International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-2 E-ISSN: 2347-2693 Implementation of Reliable Fault Tolerant Data Storage System over Cloud using Raid
More informationA Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer Guptagarima09@gmail.com
More informationA STUDY ON CLOUD STORAGE
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.966
More informationMobile Storage and Search Engine of Information Oriented to Food Cloud
Advance Journal of Food Science and Technology 5(10): 1331-1336, 2013 ISSN: 2042-4868; e-issn: 2042-4876 Maxwell Scientific Organization, 2013 Submitted: May 29, 2013 Accepted: July 04, 2013 Published:
More informationPerformance Gathering and Implementing Portability on Cloud Storage Data
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 17 (2014), pp. 1815-1823 International Research Publications House http://www. irphouse.com Performance Gathering
More informationData Centers and Cloud Computing. Data Centers
Data Centers and Cloud Computing Slides courtesy of Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet
More informationINTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
More informationStudy of a Backup Service Concept Using Secure Distributed Networks
Study of a Backup Service Concept Using Secure Distributed Networks Noriharu Miyaho, Shuichi Suzuki, and Yoichiro Ueno Tokyo Denki University 1. Introduction In the present advanced information society,
More informationCloud Computing for Control Systems CERN Openlab Summer Student Program 9/9/2011 ARSALAAN AHMED SHAIKH
Cloud Computing for Control Systems CERN Openlab Summer Student Program 9/9/2011 ARSALAAN AHMED SHAIKH CONTENTS Introduction... 4 System Components... 4 OpenNebula Cloud Management Toolkit... 4 VMware
More informationTufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao Guocui.gao@tufts.edu Mentor:
More informationTamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com
IJCSIT, Volume 1, Issue 5 (October, 2014) e-issn: 1694-2329 p-issn: 1694-2345 A STUDY OF CLOUD COMPUTING MODELS AND ITS FUTURE Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 4, July-Aug 2014
RESEARCH ARTICLE An Efficient Priority Based Load Balancing Algorithm for Cloud Environment Harmandeep Singh Brar 1, Vivek Thapar 2 Research Scholar 1, Assistant Professor 2, Department of Computer Science
More informationAVLOR SERVER CLOUD RECOVERY
AVLOR SERVER CLOUD RECOVERY WHITE PAPER 1 Table of Contents Abstract... 2 1. Introduction... 3 2. Server Cloud Recovery... 3 3. Amazon AWS Cloud... 4 a. What it is... 4 b. Why Use AWS?... 5 4. Difficulties
More informationCloud Models and Platforms
Cloud Models and Platforms Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF A Working Definition of Cloud Computing Cloud computing is a model
More informationWhite Paper. Prepared by: Neil Shah Director, Product Management March, 2014 Version: 1. Copyright 2014, ezdi, LLC.
White Paper ezcac: HIPAA Compliant Cloud Solution Prepared by: Neil Shah Director, Product Management March, 2014 Version: 1 Copyright 2014, ezdi, LLC. TECHNICAL SAFEGUARDS Access Control 164.312 (a) (1)
More informationREVIEW PAPER ON PERFORMANCE OF RESTFUL WEB SERVICES
REVIEW PAPER ON PERFORMANCE OF RESTFUL WEB SERVICES Miss.Monali K.Narse 1,Chaitali S.Suratkar 2, Isha M.Shirbhate 3 1 B.E, I.T, JDIET, Yavatmal, Maharashtra, India, monalinarse9990@gmail.com 2 Assistant
More informationCloud SQL Security. Swati Srivastava 1 and Meenu 2. Engineering College., Gorakhpur, U.P. Gorakhpur, U.P. Abstract
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 5 (2014), pp. 479-484 International Research Publications House http://www. irphouse.com /ijict.htm Cloud
More informationAutomated Virtual Cloud Management: The need of future
Automated Virtual Cloud Management: The need of future Prof. (Ms) Manisha Shinde-Pawar Faculty of Management (Information Technology), Bharati Vidyapeeth Univerisity, Pune, IMRDA, SANGLI Abstract: With
More informationData Centers and Cloud Computing. Data Centers
Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises
More informationAbout me & Submission details
About me & Submission details Parveen Yadav Security Researcher aka Ethical Hacker. Working as a Freelancer. White Hat Hacking work. Few Recognitions :- Got listed my name in Google Hall of fame,amazon,paypal,adobe
More informationAN ANDROID APPLICATION FOR ISSUING AND VERIFYING COMMUTER TRAIN TICKET THROUGH GPS USING CLOUD
BEST: International Journal of Management, Information Technology and Engineering (BEST: IJMITE) ISSN 2348-0513 Vol. 2, Issue 3, Mar 2014, 47-52 BEST Journals AN ANDROID APPLICATION FOR ISSUING AND VERIFYING
More informationRole of Cloud Computing in Big Data Analytics Using MapReduce Component of Hadoop
Role of Cloud Computing in Big Data Analytics Using MapReduce Component of Hadoop Kanchan A. Khedikar Department of Computer Science & Engineering Walchand Institute of Technoloy, Solapur, Maharashtra,
More informationISSN: 2321-7782 (Online) Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationDynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
More informationA Protocol Based Packet Sniffer
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,
More informationKeywords: PDAs, VM. 2015, IJARCSSE All Rights Reserved Page 365
Volume 5, Issue 7, July 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Energy Adaptive
More information"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"
To Study the Overall Cloud Computing Security Using Virtual Private Network. Aparna Gaurav Jaisingpure/Gulhane Email id: aparnagulhane@gmail.com Dr.D.Y.Patil Vidya Pratishthan s Dr. D.Y Patil College of
More informationBIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON
BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON Overview * Introduction * Multiple faces of Big Data * Challenges of Big Data * Cloud Computing
More informationEnsuring Security in Cloud with Multi-Level IDS and Log Management System
Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,
More informationAssignment # 1 (Cloud Computing Security)
Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 3, March 3 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Using Third Party
More informationCDBMS Physical Layer issue: Load Balancing
CDBMS Physical Layer issue: Load Balancing Shweta Mongia CSE, School of Engineering G D Goenka University, Sohna Shweta.mongia@gdgoenka.ac.in Shipra Kataria CSE, School of Engineering G D Goenka University,
More informationSymantec Backup Exec 11d for Windows Servers New Encryption Capabilities
WHITE PAPER: ENTERPRISE SECURITY Symantec Backup Exec 11d for Windows Servers New Encryption Capabilities White Paper: Enterprise Security Symantec Backup Exec 11d for Windows Servers Contents Executive
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON MOBILE APPLICATION IN A CLOUD COMPUTING SECURE AND SCALABLE USING CLOUD
More informationData Centers and Cloud Computing. Data Centers. MGHPCC Data Center. Inside a Data Center
Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises
More informationBackup Exec Private Cloud Services. Planning and Deployment Guide
Backup Exec Private Cloud Services Planning and Deployment Guide Chapter 1 Introducing Backup Exec Private Cloud Services This chapter includes the following topics: About Backup Exec Private Cloud Services
More informationEMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL
More informationThe Case Study for IsaStor Series Products
The Case Study for IsaStor Series Products (CONTINUOUS DATA PROTECTION SOLUTIONS) XLink Technology, Inc. Milpitas, California www.xlink.com August, 2006 Table of Contents The Product - IsaStor Series Software
More informationDoS: Attack and Defense
DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches
More informationCLOUD COMPUTING. When It's smarter to rent than to buy
CLOUD COMPUTING When It's smarter to rent than to buy Is it new concept? Nothing new In 1990 s, WWW itself Grid Technologies- Scientific applications Online banking websites More convenience Not to visit
More informationCHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL
CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter
More informationPayment minimization and Error-tolerant Resource Allocation for Cloud System Using equally spread current execution load
Payment minimization and Error-tolerant Resource Allocation for Cloud System Using equally spread current execution load Pooja.B. Jewargi Prof. Jyoti.Patil Department of computer science and engineering,
More informationEnterprise Resource Planning System Deployment on Mobile Cloud Computing
Asia-pacific Journal of Multimedia Services Convergence with Art, Humanities and Sociology Vol.3, No.1 (2013), pp. 1-8 http://dx.doi.org/10.14257/ajmscahs.2013.06.02 Enterprise Resource Planning System
More informationHIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
More informationInternational Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 An Efficient Approach for Load Balancing in Cloud Environment Balasundaram Ananthakrishnan Abstract Cloud computing
More informationVolume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com Image
More information2) Xen Hypervisor 3) UEC
5. Implementation Implementation of the trust model requires first preparing a test bed. It is a cloud computing environment that is required as the first step towards the implementation. Various tools
More informationIntroduction to Cloud Computing
Introduction to Cloud Computing Cloud Computing I (intro) 15 319, spring 2010 2 nd Lecture, Jan 14 th Majd F. Sakr Lecture Motivation General overview on cloud computing What is cloud computing Services
More informationKeywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
More informationOracle Database Security and Audit
Copyright 2014, Oracle Database Security and Audit Beyond Checklists Learning objectives Understand Oracle architecture Database Listener Oracle connection handshake Client/server architecture Authentication
More informationCloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
More informationCloud Platforms, Challenges & Hadoop. Aditee Rele Karpagam Venkataraman Janani Ravi
Cloud Platforms, Challenges & Hadoop Aditee Rele Karpagam Venkataraman Janani Ravi Cloud Platform Models Aditee Rele Microsoft Corporation Dec 8, 2010 IT CAPACITY Provisioning IT Capacity Under-supply
More informationFederation of Cloud Computing Infrastructure
IJSTE International Journal of Science Technology & Engineering Vol. 1, Issue 1, July 2014 ISSN(online): 2349 784X Federation of Cloud Computing Infrastructure Riddhi Solani Kavita Singh Rathore B. Tech.
More informationOverview. Timeline Cloud Features and Technology
Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers
More informationChapter 7. Using Hadoop Cluster and MapReduce
Chapter 7 Using Hadoop Cluster and MapReduce Modeling and Prototyping of RMS for QoS Oriented Grid Page 152 7. Using Hadoop Cluster and MapReduce for Big Data Problems The size of the databases used in
More informationData Centers and Cloud Computing
Data Centers and Cloud Computing CS377 Guest Lecture Tian Guo 1 Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing Case Study: Amazon EC2 2 Data Centers
More informationEfficient Integrity Checking Technique for Securing Client Data in Cloud Computing
International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 05 41 Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing Abstract-- It has been widely observed
More informationTechnical. Overview. ~ a ~ irods version 4.x
Technical Overview ~ a ~ irods version 4.x The integrated Ru e-oriented DATA System irods is open-source, data management software that lets users: access, manage, and share data across any type or number
More informationMulticast vs. P2P for content distribution
Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution
More informationDESIGN OF A PLATFORM OF VIRTUAL SERVICE CONTAINERS FOR SERVICE ORIENTED CLOUD COMPUTING. Carlos de Alfonso Andrés García Vicente Hernández
DESIGN OF A PLATFORM OF VIRTUAL SERVICE CONTAINERS FOR SERVICE ORIENTED CLOUD COMPUTING Carlos de Alfonso Andrés García Vicente Hernández 2 INDEX Introduction Our approach Platform design Storage Security
More informationGLOSSARY OF TECHNICAL TERMS
This glossary contains explanations of certain terms, definitions and abbreviations used in this prospectus in connection with our Group and our business. The terms and their meanings may not correspond
More informationFigure 1 Cloud Computing. 1.What is Cloud: Clouds are of specific commercial interest not just on the acquiring tendency to outsource IT
An Overview Of Future Impact Of Cloud Computing Shiva Chaudhry COMPUTER SCIENCE DEPARTMENT IFTM UNIVERSITY MORADABAD Abstraction: The concept of cloud computing has broadcast quickly by the information
More informationEffective disaster recovery using Software defined networking
Effective disaster recovery using Software defined networking Thyagaraju, Mrs. Jyothi. K.S, Girish.L PG Student, Associate professor, Assistant Professor Dept of CSE, Cit, Gubbi, Tumkur Abstract In this
More informationAugust 2009. Transforming your Information Infrastructure with IBM s Storage Cloud Solution
August 2009 Transforming your Information Infrastructure with IBM s Storage Cloud Solution Page 2 Table of Contents Executive summary... 3 Introduction... 4 A Story or three for inspiration... 6 Oops,
More informationKeywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Computing
More informationMigration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module
Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between
More informationREMOTE BACKUP-WHY SO VITAL?
REMOTE BACKUP-WHY SO VITAL? Any time your company s data or applications become unavailable due to system failure or other disaster, this can quickly translate into lost revenue for your business. Remote
More informationResearch on P2P-SIP based VoIP system enhanced by UPnP technology
December 2010, 17(Suppl. 2): 36 40 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://www.jcupt.com Research on P2P-SIP based VoIP system
More informationA Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification
Research Journal of Applied Sciences, Engineering and Technology 7(14): 2946-2953, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 7, 2013 Accepted: August
More informationINCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION Sanjay Razdan Department of Computer Science and Eng. Mewar
More informationInvestigation of Cloud Computing: Applications and Challenges
Investigation of Cloud Computing: Applications and Challenges Amid Khatibi Bardsiri Anis Vosoogh Fatemeh Ahoojoosh Research Branch, Islamic Azad University, Sirjan, Iran Research Branch, Islamic Azad University,
More informationInternational Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,
More information