Formal Modeling for Multi-Level Authentication in Sensor-Cloud Integration System
|
|
|
- James Rodgers
- 10 years ago
- Views:
Transcription
1 Formal Modeling for Multi-Level Authentication in Sensor-Cloud Integration System Dinesha H A Crucible of Research and Innovation PES Institute of Technology BSK 3 rd Stage Bangalore-85 R Monica M.Tech in Software Engg.. PES Institute of Technology BSK 3 rd Stage, Bangalore-85 V.K Agrawal Director, CORI PES Institute of Technology BSK 3 rd Stage, Bangalore-85 ABSTRACT Recent developments in sensor networking emphasized the need for integration of sensor networks with the cloud. This improves the processing power and battery life of the sensor nodes. Once the sensor data is routed to the cloud, possible measures need to be adopted to secure the sensor data. Thus, strict authentication checks have to be provided to facilitate authorized customers to utilize the services provided by the cloud in the form of sensor data. In this paper, we present an authentication system by employing the multi-level authentication technique in securing the sensor data in cloud. This technique generates/authenticates the password in multiple levels to access cloud services. Thus, the proposed scheme helps in improving the authentication level by order of magnitude as compared to the existing technique. We modeled the proposed system using Petri nets. General Terms Cloud Computing, Sensor Network, Security Keywords Ant colony routing algorithm, multi-level authentication technique, sensor cloud integration. 1. INTRODUCTION Recent advances in electronic and computer technologies have paved the way for the proliferation of wireless sensor networks (WSN) [1]. WSNs are autonomous systems consisting of tiny sensors. These are associated with integrated sensing, limited battery lifetime, resource constraints and limited range. The limited battery lifetime limitation can be overcome by integrating the WSNs and cloud computing technology. The cloud technology is an internet-based model which enables convenient and ondemand network access to a shared pool of configurable computing resources [2]. Various services such as, software, hardware, data storage and infrastructure are provided over internet. These are accessed from web browsers, desktop and mobile applications. Cloud Computing Technologies which are grouped into 4 different services that are depicted in figure 1 as SaaS, DSaaS, IaaS and PaaS [3]. Cloud Computing DsaaS Technology [3] provides scalable resources to store the sensor data and make that data available on demand. Since wireless sensor networks are limited in their processing power, battery life and communication speed, cloud computing offers the DsaaS service. This makes sensor data available for long term observations and for shared use of data and services in different kind of projects or analysis. Figure 1: Services provided by cloud computing In order to allow the flow of sensor data to cloud server [4], we propose to use ant colony routing algorithm [5] [6] [7]. This helps in establishing the shortest path between the sensor network and cloud server through an appropriate gateway [8]. Once the sensor data is uploaded to the cloud, it requires appropriate mechanisms for delivering the data only to the authorized users [4]. In this paper, we propose to use an authentication technique, called as multi-level authentication technique. This technique authenticates the cloud access in multiple levels. To break the authentication, one has to know the login details of all the levels. Here, in this paper, we use formal modeling for our system to precisely discuss the availability of the cloud services for the intended users, along with the provision of appropriate modeling [10], algorithm and formulations. Thus, we expect, with this proposed technique the probability unauthorized accesses can be greatly reduced. This paper is organized as follows: Section 2 discusses the multi-level authentication technique for securing sensor data. Section 3 provides the system architecture and an algorithm along a probability theory for the proposed multi-level password authentication in sensor-cloud integration system. Section 4 deals with the system modeling. This has various sub sections which involves activity diagram and Petri nets based model for the complete multi-level password generation technique for sensor-cloud integration application. Finally, the paper is concluded in section 5. 16
2 2. MULTILEVEL AUTHENTICATION TECHNIQUE FOR SECURING SENSOR DATA To access the sensor data from cloud, we are using multi-level authentication technique. This technique authenticates the cloud access in multiple levels. It generates the password and concatenates the generated- password at multiple levels. Based on the leaf level- concatenated -password, one can access the cloud services provided that the password authentication is successful in all the previous levels [11]. Fig. 2 shows the architecture of multi-level password generation technique. This architecture helps in checking the authentication against the services and privileges. It also helps to ensure which customer has what kind of privileges to use the sensor data in the cloud. This is evaluated by multiple levels authentications, where authentication activities take place in organization, team and user levels. First level of authentication is organization level password authentication/generation. It is for ensuring the cloud access authentication from cloud vendor. If unauthenticated organization or hackers tries to access the data in the cloud, they would be terminated in this level itself. The second level of authentication is a team level password authentication/ generation. It is to authenticate the team for particular cloud service. Likewise, based on the system requirements, authentication system can have even further n levels. Finally, the last level will be the user level password authentication/generation, which ensures that customer/end user has particular privileges and permission to access the data [11]. data is clearly depicted. As seen in the above figure 3, the sensor network has the ability to sense the environment, process the captured data and deliver it to the destinationwhich is nothing but the base station, for which we using zone based ant colony optimization technique [9]. Through an appropriate gateway the sensor node can be integrated with the cloud. The data packets from the sensor network can be routed efficiently to the cloud server using ant colony routing technique [12]. This finally relieves the burden of the sensor nodes to some extent and improves the processing power and battery life. Along with the provision of storage service offered to the sensor data, security services are also provided by the cloud servers. The security mechanisms are provided with the help of multi-level authentication technique which authenticates the cloud access in multiple levels. This technique provides authentication activities at organization, team and user levels. One can deploy applications more rapidly across shared server and storage resource pools than is possible with conventional enterprise solutions. Figure 2: Proposed multi-level authentication technique for securing sensor data 3. SYSTEM ARCHITECTURE Proposed system architecture shown in Figure 3, where the provision security of multi-level authentication to the sensor Figure 3: System Architecture of the Proposed Cloud computing based sensor data analysis environment Algorithm: Multilevel authenticated cloud sensor integration 17
3 3.1 Proposed Algorithm The algorithm for the complete multi-level password authentication/generation technique for securing sensor data is discussed in this section. Important notations being used in the algorithms are: CH- Cluster head, BS - Base station, CS - Cloud server, SA-service authentication, TA- team authentication and PA- privilege authentication. Initially, the sensor data is processed, routed and uploaded to the servers of the cloud which provide access only to authenticated users. For this purpose, we have proposed Multi-level authentication technique. Multi-level authentication system reads the details given by organization, team and user and produces the password output at different levels. These are discussed as follows: Step 1: Sensors would process & route the data packets to CH Step 2: CH collects data packets and route it to the BS Step 3: The routed data would be collected by the BS and upload the information to the CS Step 4: CS acts as a repository to store the info & provides access only to authenticated users. Step 5: Authentication check: Multi-level authentication checks then SA - Organization level password generation Authentication at level 0. If SA is authenticated organization TA - Team level password generation Authentication at level 1. If TA is authenticated then. PA User level password generation Authentication at level n. If PA is authenticated user then Password = Concatenate L0, L1.Ln If password privileged authenticated then Then Provide access to the sensor data in the cloud End Step 6: Exit Else Go to step Probability of Breaking Multi-Level Authentication Probability of breaking multi-level authentication to access sensor data from cloud can be formulated by using the probability theory. According to this technique, one has to know the password of all the levels in order to access the required sensor data. According to this scheme, the authentication is provided at n levels for which we have N1*N2 *Nn possible options. Therefore, the probability of hacking correct password is 1/N1*N2*N3 *Nn =>1/Nn as given in [11]. 4. SYSTEM MODELING This section presents an activity diagram for multi-level authentication technique for securing sensor data in the cloud. We also provide a Petri net model for the proposed algorithm in the preceding section. The model helps in understanding and analyzing the proposed authentication system. 4.1 Activity Diagram of Multi-level Authentication Process The proposed system activity diagram provides the clear picture of the activities of rendering security to the sensor data uploaded to the cloud servers. The security is provided using multi-level authentication system. At the first phase of this process the sensors would process the data and route it to the cluster head. This in turn would collect the data and route it to the base station which would upload the huge amount of the integrated data to the cloud. The servers of the cloud provide secure access to the information only to the authenticated users. The authentication activities provided by the cloud take place in organization, team and user levels. First, activity happens at organization level. It reads the authentication password and checks to authenticate the organization for cloud access and then it enters into a second level authentication. The second activity happens at team level. It reads the team login details and checks for authentication. Once it is done; it then enters into a user level authentication. User level activity reads the authentication information to check for the user permission and privileges. 18
4 Process the sensor data Read & Integrate the data collected from various sensors Collect the integrated packets from the cluster head Route the data packets to the cluster head Route the integrated data to the base station Sensors Cluster Head Base Station A Repository which would store the routed information Read the organization details Cloud Service Provider Provide access only to authenticated users Upload the huge sensor data information to the cloud service provider Read team details to generate team password Organization Send the generated organization password to teams Team Read user details to generate PA, Concatenate with SA & TA Send generated team password to individual team member User Figure 4: Activity diagram for secured sensor cloud integration using multilevel authentication technique 4.2 System Modeling Using Petri Nets The system modeling is done using Petri nets, which are vividly portrayed in figure 5. Petri nets are a special form of bipartite directed graph represented by < P, T, In, Out> [10], in which Place (denoted as p) and Transitions (denoted as t) are disjoint sets of nodes, and In and Out are sets of edges. We carry out formal modeling for our system to precisely discover when the user can and cannot access the services of the cloud. The model is explained as follows. As shown in figure 5, the sensor data are accessed in round robin fashion represented by places p1, p2, p3 and p4 and transitions t1, t2, t3 and t4. The sensor data are represented by places p5, p6, p7 and p8. The availability of data is indicated by the presence of tokens in these places. When the cluster head is ready, it puts a token at cluster ready place p9. This enables the required sensor data to be passed on to the sensor data queue. Similarly, when base station is ready to receive the data, it provides a token at ready place p15. The base station data are further passed on to cloud server for data storage. When a client request arrives for the token at place at p16, the system starts validating the authentication word at p19, p20 and p22 levels. 19
5 5. CONCLUSION AND FUTURE ENHANCEMENT In this paper, Formal Modeling for Multi-Level Authentication in Sensor-Cloud Integration System is done. It is expected to help in the analysis and provision of authenticated access to the data in the sensor-cloud integration system. We have described this authentication system by employing the multi- level authentication technique to secure the sensor data in cloud. This technique generates/authenticates the password at multiple levels to access cloud services. A strict authentication and authorization can be achieved through this technique. The proposed System is modeled using Petri net. Detailed analysis with respect to authentication scheme may be carried out. Our future work will be carried out in adding multi-dimensional password generation method to this system. Figure 5: System modeling using Petri nets The client is authorized only when all the levels are successfully validated. Otherwise, the request is aborted. Using this model, detailed analysis with respect to authentication scheme may be carried out which is a topic of our future research. 6. ACKNOWLEDGMENTS Our sincere thanks to Prof. K N B Murthy, Principal and Prof. Shylaja S S, HOD, Department of Information Science and Engineering, PESIT, Bangalore, for their constant encouragement 7. REFERENCES [1]. Center Bo Wang, HongYu Xing The Application of Cloud Computing in Education Informatization, Modern Educational Tech... Computer Science and Service System (CSSS), 2011 International Conference on IEEE, June 2011, , pp [2]. NIST Definition [3] Cloud Computing services & comparisons %20computing%20services.pdf [4] A Framework of Sensor - Cloud Integration Opportunities and Challenges, Mohammad Mehedi Hassan, Biao Song, Eui-Nam Huh, Published in: Proceeding ICUIMC '09 Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication ACM New York, NY, USA 2009, ISBN: [5] Maumita Bandyopadhyay, Parama Bhaumik, Zone Based Ant Colony Routing in Mobile Ad-hoc Network, IEEE conference, 2010 [6] Zone based ant colony routing for MANET to improve the performance By Dr.H Sarojadevi, Bhuvaneshwari Patil. [7] Mesut G unes, Udo Sorges, Imed Bouazizi, ARA The Ant-Colony Based Routing Algorithm for MANETs, International Workshop on Ad Hoc Networking, Vancouver, British Columbia, Canada, August 18-21, [8] Rinku Sen., Exchanging of Information between Cloud Computing Server and Sensor Node for Effective Application Development, ISDMISC 2011 [9] Selcuk Okdem and Dervis Karaboga; Routing in Wireless Sensor Network using Ant Colony Optimisation using Routing Chip ; Sensors, vol. 9, pp ,
6 [10] Petri Net Theory and the Modeling of Systems, James Lyle Peterson, publisher: prentice-hall [11] Multi-level Authentication Technique for Accessing Cloud Services, Dinesha H A and Dr.V.K. Agrawal, IEEE, International Conference of Computing, Communications and Applications, PSNA College of engineering and technology, Dindigul, Tamilnadu. [12] Wireless Sensor-Cloud Integration Using Ant Colony Routing Algorithm, R Monica, Dinesha H A and Dr.V.K. Agrawal, International conference on Cloud Computing and Service Engineering CLUSE 2012, R.R College of Engineering, Bangalore. 21
MULTI-DIMENSIONAL PASSWORD GENERATION TECHNIQUE FOR ACCESSING CLOUD SERVICES
MULTI-DIMENSIONAL PASSWORD GENERATION TECHNIQUE FOR ACCESSING CLOUD SERVICES Dinesha H A 1 and Dr.V.K Agrawal 2 1 Assistant Professor, Department of ISE & CORI, PES Institute of Technology, Bangalore,
Implementation of Multifactor Authentication System for Accessing Cloud Service
International Journal of Scientific and Research Publications, Volume 3, Issue 6, June 2013 1 Implementation of Multifactor Authentication System for Accessing Cloud Service Sumathi M *, Sharvani G.S **,
International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 ISSN 2278-7763
International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 Management of Wireless sensor networks using cloud technology Dipankar Mishra, Department of Electronics,
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,
Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing
Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Survey on Load
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
An Architecture Model of Sensor Information System Based on Cloud Computing
An Architecture Model of Sensor Information System Based on Cloud Computing Pengfei You, Yuxing Peng National Key Laboratory for Parallel and Distributed Processing, School of Computer Science, National
A NOVEL GRAPHICAL PASSWORD APPROACH FOR ACCESSING CLOUD & DATA VERIFICATION
A NOVEL GRAPHICAL PASSWORD APPROACH FOR ACCESSING CLOUD & DATA VERIFICATION Rupal Rawat 1, Sreeja Nair 2 1 M.Tech (CSE), Oriental college of science & Technology, Bhopal, Affiliated to RGPV, Bhopal, M.P,
International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 An Efficient Approach for Load Balancing in Cloud Environment Balasundaram Ananthakrishnan Abstract Cloud computing
Comparison of WCA with AODV and WCA with ACO using clustering algorithm
Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks
A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
Public Cloud Partition Balancing and the Game Theory
Statistics Analysis for Cloud Partitioning using Load Balancing Model in Public Cloud V. DIVYASRI 1, M.THANIGAVEL 2, T. SUJILATHA 3 1, 2 M. Tech (CSE) GKCE, SULLURPETA, INDIA [email protected] [email protected]
LOAD BALANCING STRATEGY BASED ON CLOUD PARTITIONING CONCEPT
Journal homepage: www.mjret.in ISSN:2348-6953 LOAD BALANCING STRATEGY BASED ON CLOUD PARTITIONING CONCEPT Ms. Shilpa D.More 1, Prof. Arti Mohanpurkar 2 1,2 Department of computer Engineering DYPSOET, Pune,India
A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 16 (2014), pp. 1605-1610 International Research Publications House http://www. irphouse.com A Load Balancing
AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
A Cloud Computing Architecture with Wireless Sensor Networks for Agricultural Applications
International Journal of Computer Networks and Communications Security VOL.2, NO.1, JANUARY 2014, 34 38 Available online at: www.ijcncs.org ISSN 2308-9830 C N C S A Cloud Computing Architecture with Wireless
Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.
Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech
Statistics Analysis for Cloud Partitioning using Load Balancing Model in Public Cloud
Statistics Analysis for Cloud Partitioning using Load Balancing Model in Public Cloud 1 V.DIVYASRI, M.Tech (CSE) GKCE, SULLURPETA, [email protected] 2 T.SUJILATHA, M.Tech CSE, ASSOCIATE PROFESSOR
Email: [email protected]. 2 Prof, Dept of CSE, Institute of Aeronautical Engineering, Hyderabad, Andhrapradesh, India,
www.semargroup.org, www.ijsetr.com ISSN 2319-8885 Vol.03,Issue.06, May-2014, Pages:0963-0968 Improving Efficiency of Public Cloud Using Load Balancing Model SHRAVAN KUMAR 1, DR. N. CHANDRA SEKHAR REDDY
A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes
CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM Mohammad Badruzzama Khan 1, Ayesha Romana 2, Akheel Mohammed
AN EFFICIENT LOAD BALANCING APPROACH IN CLOUD SERVER USING ANT COLONY OPTIMIZATION
AN EFFICIENT LOAD BALANCING APPROACH IN CLOUD SERVER USING ANT COLONY OPTIMIZATION Shanmuga Priya.J 1, Sridevi.A 2 1 PG Scholar, Department of Information Technology, J.J College of Engineering and Technology
A Survey on Load Balancing and Scheduling in Cloud Computing
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 7 December 2014 ISSN (online): 2349-6010 A Survey on Load Balancing and Scheduling in Cloud Computing Niraj Patel
A Survey Paper: Cloud Computing and Virtual Machine Migration
577 A Survey Paper: Cloud Computing and Virtual Machine Migration 1 Yatendra Sahu, 2 Neha Agrawal 1 UIT, RGPV, Bhopal MP 462036, INDIA 2 MANIT, Bhopal MP 462051, INDIA Abstract - Cloud computing is one
A Road Map on Security Deliverables for Mobile Cloud Application
A Road Map on Security Deliverables for Mobile Cloud Application D.Pratiba 1, Manjunath A.E 2, Dr.N.K.Srinath 3, Dr.G.Shobha 4, Dr.Siddaraja 5 Asst. Professor, Department of Computer Science and Engineering,
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
Models of Load Balancing Algorithm in Cloud Computing
Models of Load Balancing Algorithm in Cloud Computing L. Aruna 1, Dr. M. Aramudhan 2 1 Research Scholar, Department of Comp.Sci., Periyar University, Salem. 2 Associate Professor & Head, Department of
Identifying Data Integrity in the Cloud Storage
www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and
Implementation of Load Balancing Based on Partitioning in Cloud Computing
Implementation of Load Balancing Based on Partitioning in Cloud Computing S. Adiseshu Gupta 1, K. V. Srinivasa Rao 2 PG Student, Department of CSE, Prakasm Engineering College, Kandukur, AndhraPradesh,
Privileged Cloud Storage By MaaS JuJu
Privileged Cloud Storage By MaaS JuJu Sarita Shankar Pol 1, S. V. Gumaste 2 1 Computer Engineering, Sharadchandra College of Engineering, Otur (Pune), India 2 Professor, Computer Engineering, Sharadchandra
Efficient Data Transmission For Wireless Sensor Networks
Volume: 2, Issue: 4, 221-225 April 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Girijalaxmi M.Tech scholar, Department of computer Vasudev S Senior assistant
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,
OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM
OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM S. Sofia 1, M.Varghese 2 1 Student, Department of CSE, IJCET 2 Professor, Department of CSE, IJCET Abstract This paper proposes fault node recovery
An Intelligent Approach for Data Fortification in Cloud Computing
An Intelligent Approach for Data Fortification in Cloud Computing Supriya Mandhare 1, Prof. A. K. Sen 2, Asso. Prof. Rajkumar Shende 3 1,3 Department of Computer Engineering, St. Francis Institute of Technology,
A Game Theoretic Approach for Cloud Computing Infrastructure to Improve the Performance
P.Bhanuchand and N. Kesava Rao 1 A Game Theoretic Approach for Cloud Computing Infrastructure to Improve the Performance P.Bhanuchand, PG Student [M.Tech, CS], Dep. of CSE, Narayana Engineering College,
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS *Dr Umesh Sehgal, #Shalini Guleria *Associate Professor,ARNI School of Computer Science,Arni University,[email protected]
ABSTRACT. KEYWORDS: Cloud Computing, Load Balancing, Scheduling Algorithms, FCFS, Group-Based Scheduling Algorithm
A REVIEW OF THE LOAD BALANCING TECHNIQUES AT CLOUD SERVER Kiran Bala, Sahil Vashist, Rajwinder Singh, Gagandeep Singh Department of Computer Science & Engineering, Chandigarh Engineering College, Landran(Pb),
Cloud Computing Security Issues And Methods to Overcome
Cloud Computing Security Issues And Methods to Overcome Manas M N 1, Nagalakshmi C K 2, Shobha G 3 MTech, Computer Science & Engineering, RVCE, Bangalore, India 1,2 Professor & HOD, Computer Science &
A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing
A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing Radhika Sarad, Kiran Bhame, Vaibhav Wabale, Amol Katake B.E. Students, Dept. of Computer Engineering, KJCOEMR, Pune, Maharashtra,
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK IMPLEMENTATION OF AN APPROACH TO ENHANCE QOS AND QOE BY MIGRATING SERVICES IN CLOUD
On Cloud Computing Technology in the Construction of Digital Campus
2012 International Conference on Innovation and Information Management (ICIIM 2012) IPCSIT vol. 36 (2012) (2012) IACSIT Press, Singapore On Cloud Computing Technology in the Construction of Digital Campus
CDBMS Physical Layer issue: Load Balancing
CDBMS Physical Layer issue: Load Balancing Shweta Mongia CSE, School of Engineering G D Goenka University, Sohna [email protected] Shipra Kataria CSE, School of Engineering G D Goenka University,
A Survey on Load Balancing Techniques Using ACO Algorithm
A Survey on Load Balancing Techniques Using ACO Algorithm Preeti Kushwah Department of Computer Science & Engineering, Acropolis Institute of Technology and Research Indore bypass road Mangliya square
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON MOBILE APPLICATION IN A CLOUD COMPUTING SECURE AND SCALABLE USING CLOUD
5 International Journal of Scientific & Engineering Research, Volume Ŝǰȱ ȱřǰȱ ȬŘŖŗśȱȱ ISSN 2229-5518
5 International Journal of Scientific & Engineering Research, Volume Ŝǰȱ ȱřǰȱ ȬŘŖŗśȱȱ Open Platform Cloud Infrastructure Model with Enhanced Virtualization Sountharrajan Sehar, Abilash Rajasekaran, Elangovan
Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009
Perspectives on Moving to the Cloud Paradigm and the Need for Standards Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009 2 NIST Cloud Computing Resources NIST Draft Definition of
DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION
DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION Prof. M. Ben Swarup Professor, Department of CSE Vignan's Institute of Information Technology Visakhapatnam-49, India Chukkala
Cloud Computing Services and its Application
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 1 (2014), pp. 107-112 Research India Publications http://www.ripublication.com/aeee.htm Cloud Computing Services and its
E-LEARNING DEVELOPMENT AS PUBLIC INFRASTRUCTURE OF CLOUD COMPUTING
E-LEARNING DEVELOPMENT AS PUBLIC INFRASTRUCTURE OF CLOUD COMPUTING 1 DANNY MANONGGA, 2 WIRANTO HERRY UTOMO, 3 HENDRY 1 Information System Department, Satya Wacana Christian University 2 Information System
A Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer [email protected]
A Survey on Software as a Service (Saas) Cloud for Programming Language Computing
A Survey on Software as a Service (Saas) Cloud for Programming Language Computing Prof. Balamurugan E Sujith Jayapraksh Dominic Owusu Assoc. Prof of ICT Sr. Lecturer of ICT Lecturer BlueCrest College BlueCrest
Investigation of Cloud Computing: Applications and Challenges
Investigation of Cloud Computing: Applications and Challenges Amid Khatibi Bardsiri Anis Vosoogh Fatemeh Ahoojoosh Research Branch, Islamic Azad University, Sirjan, Iran Research Branch, Islamic Azad University,
Cloud Web-Based Operating System (Cloud Web Os)
Cloud Web-Based Operating System (Cloud Web Os) Hesham Abusaimeh Department of Computer Science, Faculty of Information Technology, Applied Science University, Amman, 11931 Jordan. ABSTRACT The cloud computing
Role of Cloud Computing in Big Data Analytics Using MapReduce Component of Hadoop
Role of Cloud Computing in Big Data Analytics Using MapReduce Component of Hadoop Kanchan A. Khedikar Department of Computer Science & Engineering Walchand Institute of Technoloy, Solapur, Maharashtra,
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
Private Cloud in Educational Institutions: An Implementation using UEC
Private Cloud in Educational Institutions: An Implementation using UEC D. Sudha Devi L.Yamuna Devi K.Thilagavathy,Ph.D P.Aruna N.Priya S. Vasantha,Ph.D ABSTRACT Cloud Computing, the emerging technology,
Security Model for VM in Cloud
Security Model for VM in Cloud 1 Venkataramana.Kanaparti, 2 Naveen Kumar R, 3 Rajani.S, 4 Padmavathamma M, 5 Anitha.C 1,2,3,5 Research Scholars, 4Research Supervisor 1,2,3,4,5 Dept. of Computer Science,
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
Mobile Hybrid Cloud Computing Issues and Solutions
, pp.341-345 http://dx.doi.org/10.14257/astl.2013.29.72 Mobile Hybrid Cloud Computing Issues and Solutions Yvette E. Gelogo *1 and Haeng-Kon Kim 1 1 School of Information Technology, Catholic University
How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System
REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya
A Game Theory Modal Based On Cloud Computing For Public Cloud
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. XII (Mar-Apr. 2014), PP 48-53 A Game Theory Modal Based On Cloud Computing For Public Cloud
Role of Cloud Computing in Education
Role of Cloud Computing in Education Kiran Yadav Assistant Professor, Dept. of Computer Science. Govt. College for Girls, Gurgaon, India ABSTRACT: Education plays an important role in maintaining the economic
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
Cloud Based E-Government: Benefits and Challenges
Cloud Based E-Government: Benefits and Challenges Saleh Alshomrani 1 and Shahzad Qamar 2 1 Faculty of Computing and IT, King Abdulaziz University, Jeddah, Saudi Arabia 2 Faculty of Computing and IT, North
Load Balancing Algorithms in Cloud Environment
International Conference on Systems, Science, Control, Communication, Engineering and Technology 50 International Conference on Systems, Science, Control, Communication, Engineering and Technology 2015
Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks
Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks Lohith Raj S N, Shanthi M B, Jitendranath Mungara Abstract Protecting data from the intruders
A Study of Data Management Technology for Handling Big Data
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 3, March 3 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Using Third Party
SPY AGENT BASED SECURE DATA AGGREGATION IN WSN
ISSN: 2229-6948(ONLINE) ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, DECEMBER 214, VOLUME: 5, ISSUE: 4 SPY AGENT BASED SECURE DATA AGGREGATION IN WSN T. Lathies Bhasker 1 and G. Arul Jagan 2 1 Department
How To Understand Cloud Computing
Overview of Cloud Computing (ENCS 691K Chapter 1) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ Overview of Cloud Computing Towards a definition
Last Updated: July 2011. STATISTICA Enterprise Server Security
Last Updated: July 2011 STATISTICA Enterprise Server Security STATISTICA Enterprise Server Security Page 2 of 10 Table of Contents Executive Summary... 3 Introduction to STATISTICA Enterprise Server...
Effective Load Balancing Based on Cloud Partitioning for the Public Cloud
Effective Load Balancing Based on Cloud Partitioning for the Public Cloud 1 T.Satya Nagamani, 2 D.Suseela Sagar 1,2 Dept. of IT, Sir C R Reddy College of Engineering, Eluru, AP, India Abstract Load balancing
MIGRATION FROM SINGLE TO MULTI-CLOUDS TO SHRIVEL SECURITY RISKS IN CLOUD COMPUTING. K.Sireesha 1 and S. Suresh 2
IJCITP Volume.8* Number 2* December 2013, pp. 53-58 Serials Publications MIGRATION FROM SINGLE TO MULTI-CLOUDS TO SHRIVEL SECURITY RISKS IN CLOUD COMPUTING K.Sireesha 1 and S. Suresh 2 1 M.Tech. Student,
The International Journal Of Science & Technoledge (ISSN 2321 919X) www.theijst.com
THE INTERNATIONAL JOURNAL OF SCIENCE & TECHNOLEDGE Efficient Parallel Processing on Public Cloud Servers using Load Balancing Manjunath K. C. M.Tech IV Sem, Department of CSE, SEA College of Engineering
ADAPTIVE LOAD BALANCING FOR CLUSTER USING CONTENT AWARENESS WITH TRAFFIC MONITORING Archana Nigam, Tejprakash Singh, Anuj Tiwari, Ankita Singhal
ADAPTIVE LOAD BALANCING FOR CLUSTER USING CONTENT AWARENESS WITH TRAFFIC MONITORING Archana Nigam, Tejprakash Singh, Anuj Tiwari, Ankita Singhal Abstract With the rapid growth of both information and users
A Comparative Study of Load Balancing Algorithms in Cloud Computing
A Comparative Study of Load Balancing Algorithms in Cloud Computing Reena Panwar M.Tech CSE Scholar Department of CSE, Galgotias College of Engineering and Technology, Greater Noida, India Bhawna Mallick,
Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART
Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART Abdul Aziz Memon and Seung Ho Hong Abstract In this paper load-balancing routing algorithm for WirelessHART standard is proposed. WirelessHART
Internet Video Streaming and Cloud-based Multimedia Applications. Outline
Internet Video Streaming and Cloud-based Multimedia Applications Yifeng He, [email protected] Ling Guan, [email protected] 1 Outline Internet video streaming Overview Video coding Approaches for video
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India
CLOUD COMPUTING 1 Er. Simar Preet Singh, 2 Er. Anshu Joshi 1 Assistant Professor, Computer Science & Engineering, DAV University, Jalandhar, Punjab, India 2 Research Scholar, Computer Science & Engineering,
The Load Balancing Strategy to Improve the Efficiency in the Public Cloud Environment
The Load Balancing Strategy to Improve the Efficiency in the Public Cloud Environment Majjaru Chandra Babu Assistant Professor, Priyadarsini College of Engineering, Nellore. Abstract: Load balancing in
@IJMTER-2015, All rights Reserved 355
e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com A Model for load balancing for the Public
A Survey on Scalable Data Security and Load Balancing in Multi Cloud Environment
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 8 January 2015 ISSN (online): 2349-6010 A Survey on Scalable Data Security and Load Balancing in Multi Cloud
CLOUD COMPUTING PARTITIONING ALGORITHM AND LOAD BALANCING ALGORITHM
CLOUD COMPUTING PARTITIONING ALGORITHM AND LOAD BALANCING ALGORITHM Anisaara Nadaph 1 and Prof. Vikas Maral 2 1 Department of Computer Engineering, K.J College of Engineering and Management Research Pune
A Study of Network Security Systems
A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya
Bandwidth Management Framework for Multicasting in Wireless Mesh Networks
Bandwidth Management Framework for Multicasting in Wireless Mesh Networks Manaswi Saha and P. Venkata Krishna Abstract Wireless mesh networks (WMNs) provide a reliable and a scalable solution for multicasting.
