Index Terms: Vehicular Ad-Hoc Network (VANET), Road Side Unit (RSU), Vehicular Cloud (VC), Security, Privacy, Mobility.

Size: px
Start display at page:

Download "Index Terms: Vehicular Ad-Hoc Network (VANET), Road Side Unit (RSU), Vehicular Cloud (VC), Security, Privacy, Mobility."

Transcription

1 Implementing Storage as a Service in VANET using Cloud Environment. Monica Mandal,Chaitrali Landge,Pramila Gaikwad,Uma Nagaraj,Ashwini Abhale. Department of Computer Engineering, MIT Academy Of Engineering,Alandi(D).Pune monica2mandal@gmail.com,chaitrali.landge@gmail.com,gaikwadpramila29@gmail.com A B S T R A C T Vehicular ad hoc networks (VANETs) represents challenging part of mobile ad hoc networks that enables vehicles to communicate to other vehicles or road side infrastructure (RSU s). Cloud Computing is recent popular technology which is used to host our storage, application services and software s over a network such as internet. In this paper we have mainly combined the features of VANET and used that on cloud as pay-as-per use. This concept is called as Vehicular Cloud Computing. As in VANET nodes are mobile vehicles which change their position at specific time,so by considering dynamic environment we rent the services on vehicles through the RSU, which stores the car data in database as itslocation, storage space, and identification number(id.no) and provide data to cars which is used by consumers. The Security, Authentication and Privacy issues are big challenges in vehicular cloud computing. Index Terms: Vehicular Ad-Hoc Network (VANET), Road Side Unit (RSU), Vehicular Cloud (VC), Security, Privacy, Mobility. I. INTRODUCTION Vehicular Ad-hoc Network (VANET) is defined as a set of moving nodes (vehicles) in a wireless network and type of mobile ad hoc networks, with mobile nodes being vehicles and Road Side Units (RSUs) as static nodes. VANETs are distinguished from other kind of ad hoc networks due to their hybrid architecture, node movements and have some unique characteristics as short radio range, low bandwidth, rapid-changing topology and high mobility of vehicle nodes. VANET is formed by vehicles which are connected to wireless communication devices, positioning system and digital maps. It also allows vehicles to connect to roadside unit (RSU), which are fixed infrastructure with powerful computing devices. Hence, vehicle-to-vehicle and vehicle-to-infrastructure communication will be possible. One of the many goals of VANET is to support traffic safety and make the driving experience more safe and comfortable [7]. Cloud computing is also known as utility computing which is based on pay-as-you-go service. The scenario could be easily compared with our daily life, where we use gas and electricity in our homes as much as we need and at the end of the month we pay for exactly what we have used, neither more nor less [7]. Cloud computing is a shared pool of configurable computing resources as network, servers, storage, applications and other services that can be rapidly provisioned and released with minimal management efforts and service provider interaction[10]. All services provided to customers present on remote machine you need not to install any service on your machine you need to use only interface (browser) to connect that remote server and such idea is provided by cloud computing. Cloud provides on demand self service, resource pooling, scalability, location independent online access etc. [8]. Cloud computing is , IJAFRC All Rights Reserved

2 started from the realization that instead of buying and installing necessary software and hardware, businesses may rent the needed infrastructure and software to run their applications. Cloud computing saves time as there is not installation and up gradation of software application. [2]. Cloud computing provides platform to the users to allow different kind of services like- Software as a Service (SaaS) - A provider licenses an application to customers as a service on demand, through a subscription, in a "pay-as-you-go" model. This allow customers to use expensive software as much as their application require and no need to pay ahead much money or even hire more operators to install and maintain that software. IBM is a good example of this category [2]. Platform as a Service (PaaS) -PaaS solutions are development platforms for which the development tool itself is hosted in the cloud and accessed through a browser. With PaaS, developers can build web applications without installing any tools on their computer and then deploy those applications without any specialized systems administration skills. Google App Engine and Microsoft Azure are good example of that category [2]. Infrastructure as a Service (IaaS) - where the cloud provider provides its customers with computing, network and storage resources. Amazon Web Services (AWS) is a very good example of this category where Amazon provides its customers computing resources through its Elastic Compute Cloud (EC2) service and storage service through Simple Storage Service (S3) and Elastic Book Store (EBS), also File as a Service (FaaS), Database as a Service (DaaS) are the popular recent services [2]. In VANET, vehicles which provide services like Cloud are called Vehicular Cloud. VC is formed by combining VANET which has internet access, storage, on-board computation etc and Cloud techniques [2]. In VANET, cloud computing can be used as Network as a Service (NaaS) or Storage as a Service (SaaS). Not all the cars on the road have internet access. In NaaS, the car with access to internet can offer its excess capacity to the other cars in VANET upon request. For SaaS the vehicles with sample storage capacity share storage with other vehicles which need storage capacity for temporary application. In this paper, we will mainly focus on the SaaS [1].Mobility of vehicles is factor that affects the ability to serve as cloud server as they have very short time to interact with neighbor. II. LITERATURE REVIEW Ad hoc cloud structure combines mobile ad hoc, vehicular ad hoc networks and cloud to obtain better traffic control and safety on a road. The main part of this paper is to create traffic control using ad hoc network and cloud computing, to create vehicular cloud using two type of services as Network as a service and Storage as a service. For scalability we design multiplier ad hoc network structure which has wireless smaller base station and mobile multihop backbone as mobile user. Multiplier ad hoc network is formed by moving the city buses and car at specified path which transfer their services to each other through multihop backbone which can be mobile, laptops and also car which has network access [1]. The taxonomy to build future use VANET Cloud is discussed below. Cloud is designed for different types of vehicular network (VANET)[10]. Based on architectural, security and privacy of VC, the clouds are of three types as: Vehicular clouds (VC), Vehicles using clouds (VuC) and Hybrid clouds (HC). VC is further divided into two types according to motion of vehicles as static and dynamic VC. VuC connect VANET to traditional clouds in which VANET uses cloud storage services for traffic information. HC interact with traditional clouds for service exchange using gateways like RSUs and vehicles [7].Vehicular cloud is formed on fly by dynamically changing resources and information. Vehicles communicate with short , IJAFRC All Rights Reserved

3 range wireless transceiver and high mobility that creates challenges in managing authentication, authorization and accountability. The main motto of this paper is: 1. Analyze security challenges and privacy threats in VCC. 2. Measure design issues which affect implementation of VCC. 3. Providing some security protocols and solutions, as direction for security and protect privacy. Large numbers of vehicles on road and parking slots are as computational resources which are used to provide services. Vehicles spend their more time in parking, garage and driveways. Parked vehicles are unexploited one which is wasted type of resource. These things make vehicles a perfect type of node in cloud computing. Number of vehicles rent their resources on board as beneficial economically. The VC2 differs from conventional one with these characters as mobility, agility and autonomy [9].A typical car or truck today is likely to contain at least some of the following devices: an on-board computer, a GPS device, a radio transceiver, a short-range rear collision radar device, and a camera, supplemented, in high-end models, by a variety of sophisticated sensing devices. Some high-end vehicles already offer the convenience of an Event Data Recorder (EDR) that collects transactional data from most if not all of the vehicle sub-assemblies. These sub-assemblies can report such attributes as the current geographic position, current speed, momentary acceleration or deceleration, lane changes, road surface temperature and the presence of black ice [3]. Advancements in vehicular networks, embedded devices, and cloud computing can be used to form which is called as Vehicular Cloud Computing, VC2 for short. In VC2, the underutilized vehicles resources such as computing power, Internet connectivity and storage can be shared between drivers or rented over the Internet to various customers, very much like usual cloud resources [3]. Rapid increase in road traffic volume in major cities and towns of various countries has lead to traffic congestions and accidents. Therefore it becomes necessary to introduce advanced intelligent road traffic information systems, which can monitor and control vehicle movements to minimize such problems. This has extended the idea of (MANET) to roadway and street communications. This new type of network is referred to as VANET. Researchers have abstracted the idea of Vehicular Ad Hoc Networks (VANET s) in which vehicles, equipped with wireless communication devices, positioning systems and digital maps, act as intelligent machines that communicate for safety and comfort purposes [2]. They employ the communication between V2V (-Vehicle-to Vehicle) and V2I (Vehicle-to-Infrastructure).VANETs allow vehicles to connect to roadside units(rsu s) i.e. they are the fixed roadside infrastructure equipped with powerful computing devices.they can connect with each other via wireless or wired network.rsu act as cloud directories that store information about mobile cloud servers. We give this mobile cloud server the name of transportationserver (STAR). RSU s will form a within distributed dynamic index of the locations and resources of STAR s. Users can select the STAR s they prefer according to their own criteria. This system is called as discovering and consuming services vehicular clouds (CROWN) [2]. III. LIMITATIONS AND SCOPE OF RESEARCH Author [1] shows the security issue on cloud networks as increasing nodes increase complexity. User identity spoofing and tempering data is main issue in network where one user attacks on another user with same priority level. Data integrity occurs as nodes have high mobility they connect for few moments. As increase in metropolitan area, large building and infrastructure signal detection error occurred. With increase in vehicles and absence of global authority network scalability question occurred. Senders say to another to obtain data and illegitimate advantage. For example, s address spoofing. Sender does not give modified data and forge information; also they don t know when data is altered. Data manipulation , IJAFRC All Rights Reserved

4 in some another user is called repudiation. Data privacy breaks and data leaks. The attacker mounts data and information and block that information for other users for their own use[3].drivers use their mobile phone to connect to cloud via internet but mobile devices suffer from some limitations like battery low and some processing point. Uploading real-time information on the cloud such as traffic jam or accident situation, by using the internet is costly and time consuming. Storage as a service in vehicular network is different from computing resources as but we can use vehicular storage as a backup for future use. Security and privacy are always the two main concerns when allowing multiple users to share same set of resources. The scenario discussed in the subsection admits of myriad variations ranging from dynamic scheduling of traffic lanes dedicated exclusively to High Occupancy Vehicles [3].Validation and verification of intelligent automobiles: The human behavior modeling is not limited to healthcare monitoring and mood detection. It is more complex and involves thought process. The correct modeling of human behaviors is of utmost important in validation and verification process of vehicular cyber-physical systems[10]. Driver s state and skills: The correction representation of driver s current state while driving determines his safety. Security and privacy concerns: The driver s privacy and security is always a challenging research issue in V-Cloud services. This can be dealt with by implementing a module with authorization and authentication functionalities. By varying the number of RSUs and Simulating Traffic Jams. It is not possible to maintain the list of all nodes in VANET, it is characterized by frequent changes of the network topology. It is not possible to list of all the replicas in the VANET. Vehicles have High mobility and there for the network topology is changed at any particular time so Partitioned Network is formed [2]. IV. ARCHITECTURE VIEW In figure 1 we consider parking area of malls in which there are three actors as Producer, Consumer as Vehicles and RSU as fixed node which provide computational resources. We describe their activities as below: Figure 1: Architectural Model Sr. No. Description 1 Request For Storage 2.1 Replay with Storage Space 2.2 Replay with No Storage Available 3 Send Available Data , IJAFRC All Rights Reserved

5 4 Request For Data 5 Broadcast Request 6 Replay with Requested Data 6.1 Data in single producer vehicle 6.2 Data in multiple producer vehicle 7 Forward Data Table 1: Control Flow of Architectural Model A. Request For Storage- i. Whenever a vehicle enters the parking mall RSU will detect the vehicle and ask for how much storage available in it for requesting the vehicles. B. In this according to vehicle type there are two types of replay as it is producer vehicle then- i. Replay with Storage Space- ii. iii. iv. If the storage space available in vehicle it will replay to RSU with positive acknowledgement with available storage space. Replay with No Storage Available- As vehicle is consumer it doesn t have a memory to stored data. It has display to view data. So when it get request it replays with no space available. C. Send Available Data- D. RSU send currently available data from shopkeeper database to producer vehicle. Producer vehicle stored/update data periodically E. Request For Data- F. When a consumer vehicle needs the data, it send request to RSU. G. Broadcast Request- H. When consumer request for data is received by RSU. It broadcast this request to all producer vehicles. I. Replay with Requested Data- i. Data in single producer vehicle- ii. iii. iv. When requested data in one producer it replay with that data to RSU. Data in multiple producer vehicle- When data is distributed in number of producer vehicles then all vehicles replay data to RSU as it get request. J. Forward Data- K. RSU forward the data to consumer. As data is distributed, the forwarded data is not in sequence. When data come in consumer vehicles, the data is concatenate. V. CHALLENGES IN VEHICULAR CLOUD COMPUTING , IJAFRC All Rights Reserved

6 The main challenges in vehicular cloud are Security and Privacy of data. High mobility of nodes, signal attenuation and network scalability. As per the discussion the security and privacy challenges of vehicular cloud is authentication of high mobile vehicles also complexity in trust relationship among multiplayer short range communication. As data is stored in cloud there is no restriction on any user to interact with that data so there is risk as loss of data. The main challenges for VANET clouds are expected to be gossip interval, mobile authentication, conditional anonymity and virtualization, insiders and outsiders, renting out resources, autonomy, control, and cooperation middle wares [7].VCPS (Vehicular Cyber Physical System) is smart vehicle which control and reduce the emission of CO 2 in urban areas. [We can] they decide to bundling methods are allow to RSUs to delivered maximum amount of data to users. Big challenge is short term parking as data center is dynamic in nature and car time to leave is not known to anyone [4]. The main security challenges of VC include: Verifying the authentication of users and the integrity of messages due to the high mobility of nodes. Ensuring the confidentiality of sensitive message by using the cryptographic algorithm. Ensuring the secure location and localization because most application sin vehicular systems rely on location information. Providing data isolation to ensure the security of stored data on the cloud. Secure data access to protect stored data on the cloud against unauthorized access. The security and privacy issue of VC has not yet been addressed in the literature and need more consideration [9]. VI. CONCLUSION In this paper we compared many research papers on VANET, cloud computing and vehicular cloud. By analyzing their limitations, challenges and objectives we get beneficial information on vehicular cloud. Also we discuss about the services which are provided by VC and their security and privacy issues when it stored on cloud. As first we introduce the basic concept of VANET, cloud and VC then reviewing the literature of research paper we got some idea on VC also by considering its application and real life use. VII. REFERENCES [1] Md Ali Al Mamun, KhairulAnam, MdFakhrulAlamOnik, A M Esfar- E- Alam. Deployment of Cloud Computing into VANET to Create Ad Hoc Cloud Network Architecture,Proceedings of the World Congress on Engineering and Computer Science 2012 Vol I WCECS 2012, October 24-26, 2012, San Francisco, USA. [2] KhaleelMershad and Hassan Artail, Finding a STAR in a Vehicular Cloud,Department of Electrical and Computer Engineering American University of Beirut, ,Lebanon. 23 April [3] M. Abuelela and S. Olariu, Taking VANET to the clouds, Book Taking VANET to the clouds, Series Taking VANET to the clouds, ed., Editored.ˆeds., ACM, 2010, pp , IJAFRC All Rights Reserved

7 [4] Hassan Abid, LuongThi Thu Phuong, Jin Wang,Sungyoung Lee, SaadQaisar Kyung Hee University, Computer Engineering Department, Korea. October 29,2011. [5] B. Aslam, P. Wang, and C. Zou, An economical, deployable and secure vehicular ad hoc network, in Proc. Military Communication Conf., San Diego, CA, Nov. 2008, pp [6] K. Mershad, H. Artail, and M. Gerla, We can deliver messages to far vehicles, IEEE Trans Intell. Transp. Syst., vol. 13, no. 3, pp ,Sept R. [7] Hussain, J. Son, H. Eun, S. Kimand H. Rethinking Vehicular Communications: MergingVANET with Cloud Computing, Oh Department of Computer Science and Engineering, Hanyang University ERICA Campus, South Korea.2012 IEEE 4th International Conference on Cloud Computing Technology and Science. [8] N.I.T.H Standard Definitions. [9] MdWhaiduzzaman, Mehdi Sookhak, Abdullah Gani, RajkumarBuyya, Journal of Network and Computer Applications A survey on vehicular cloud computing. Received 27 February 2013 Received in revised form 6 June 2013 Accepted 20 August [10] Ashwini Abhale, Sumit Khandelwal, Uma Nagaraj, Shifting VANET to Cloud Survey,, International Journal of Advanced Research in Computer Science and Software Engineering. Volume 3, Issue 11, received November , IJAFRC All Rights Reserved

Vehicular Cloud. Fan Zhang

Vehicular Cloud. Fan Zhang Vehicular Cloud Fan Zhang Outline VANET Cloud computing Vehicular cloud: motivation and concept Application scenarios Challenges: architecture/security Data forwarding Questions VANET Deliver timely information

More information

Deployment of Cloud Computing into VANET to Create Ad Hoc Cloud Network Architecture

Deployment of Cloud Computing into VANET to Create Ad Hoc Cloud Network Architecture Deployment of Cloud Computing into VANET to Create Ad Hoc Cloud Network Architecture Md Ali Al Mamun, Khairul Anam, Md Fakhrul Alam Onik, A M Esfar- E- Alam Abstract- Vehicular Ad Hoc Network (VANET) has

More information

VANET-CLOUD: A GENERIC CLOUD COMPUTING MODEL FOR VEHICULAR AD HOC NETWORKS

VANET-CLOUD: A GENERIC CLOUD COMPUTING MODEL FOR VEHICULAR AD HOC NETWORKS A CCEPTED FROM O PEN C ALL VANET-CLOUD: A GENERIC CLOUD COMPUTING MODEL FOR VEHICULAR AD HOC NETWORKS SALIM BITAM, ABDELHAMID MELLOUK, AND SHERALI ZEADALLY Salim Bitam is with the University of Biskra.

More information

Security Considerations for Public Mobile Cloud Computing

Security Considerations for Public Mobile Cloud Computing Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of

More information

Road-Based Routing Protocol for Vanet Using Sumo and Move

Road-Based Routing Protocol for Vanet Using Sumo and Move International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-2 E-ISSN: 2347-2693 Road-Based Routing Protocol for Vanet Using Sumo and Move Devipriya. D 1 and Muruganandam.A

More information

INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET-

INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET- ABSTRACT INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET- Bahidja Boukenadil¹ ¹Department Of Telecommunication, Tlemcen University, Tlemcen,Algeria Now in the world, the exchange of information between

More information

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining

More information

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS *Dr Umesh Sehgal, #Shalini Guleria *Associate Professor,ARNI School of Computer Science,Arni University,KathagarhUmeshsehgalind@gmail.com

More information

Car Connections. Johan Lukkien. System Architecture and Networking

Car Connections. Johan Lukkien. System Architecture and Networking Car Connections Johan Lukkien System Architecture and Networking 1 Smart mobility, TU/e wide Cooperative Driving (platooning), A270: Helmond-Eindhoven, 2011 (Mechanical Engineering/TNO) Full electric:

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,

More information

Mobile Cloud Computing Security Considerations

Mobile Cloud Computing Security Considerations 보안공학연구논문지 (Journal of Security Engineering), 제 9권 제 2호 2012년 4월 Mobile Cloud Computing Security Considerations Soeung-Kon(Victor) Ko 1), Jung-Hoon Lee 2), Sung Woo Kim 3) Abstract Building applications

More information

Cloud Computing Services and its Application

Cloud Computing Services and its Application Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 1 (2014), pp. 107-112 Research India Publications http://www.ripublication.com/aeee.htm Cloud Computing Services and its

More information

V-Cloud: Vehicular Cyber-Physical Systems and Cloud Computing

V-Cloud: Vehicular Cyber-Physical Systems and Cloud Computing V-Cloud: Vehicular Cyber-Physical Systems and Cloud Computing 1 Hassan Abid, 1 Luong Thi Thu Phuong, 1 Jin Wang, 1 Sungyoung Lee, 2 Saad Qaisar 1 Kyung Hee University, Computer Engineering Department,

More information

The Private Cloud Your Controlled Access Infrastructure

The Private Cloud Your Controlled Access Infrastructure White Paper: Private Clouds The ongoing debate on the differences between a Public and Private Cloud are broad and often loud. The bottom line is that it s really about how the resource, or computing power,

More information

Cloud Computing Architecture: A Survey

Cloud Computing Architecture: A Survey Cloud Computing Architecture: A Survey Abstract Now a day s Cloud computing is a complex and very rapidly evolving and emerging area that affects IT infrastructure, network services, data management and

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

Intelligent Transportation Systems using IoT Service for Vehicular Data Cloud

Intelligent Transportation Systems using IoT Service for Vehicular Data Cloud IJIRST International Journal for Innovative Research in Science & Technology Volume 2 Issue 02 July 2015 ISSN (online): 2349-6010 Intelligent Transportation Systems using IoT Service for Vehicular Data

More information

How To Understand Cloud Computing

How To Understand Cloud Computing Overview of Cloud Computing (ENCS 691K Chapter 1) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ Overview of Cloud Computing Towards a definition

More information

Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD

Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD Agenda Cloud Computing Technical Overview Cloud Related Applications Identified Risks Assessment Criteria Cloud Computing What Is It? National

More information

White Paper on CLOUD COMPUTING

White Paper on CLOUD COMPUTING White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples

More information

CHAPTER 8 CLOUD COMPUTING

CHAPTER 8 CLOUD COMPUTING CHAPTER 8 CLOUD COMPUTING SE 458 SERVICE ORIENTED ARCHITECTURE Assist. Prof. Dr. Volkan TUNALI Faculty of Engineering and Natural Sciences / Maltepe University Topics 2 Cloud Computing Essential Characteristics

More information

Cloud Computing. Karan Saxena * & Kritika Agarwal**

Cloud Computing. Karan Saxena * & Kritika Agarwal** Page29 Cloud Computing Karan Saxena * & Kritika Agarwal** *Student, Sir M. Visvesvaraya Institute of Technology **Student, Dayananda Sagar College of Engineering ABSTRACT: This document contains basic

More information

CLOUD COMPUTING IN HIGHER EDUCATION

CLOUD COMPUTING IN HIGHER EDUCATION Mr Dinesh G Umale Saraswati College,Shegaon (Department of MCA) CLOUD COMPUTING IN HIGHER EDUCATION Abstract Technology has grown rapidly with scientific advancement over the world in recent decades. Therefore,

More information

Real Time Services for Future Cloud Computing Enabled Vehicle Networks

Real Time Services for Future Cloud Computing Enabled Vehicle Networks Real Time Services for Future Cloud Computing Enabled Vehicle Networks 1,2 Jin Wang, 2 Tinghuai Ma, 1 Jinsong Cho, 1 Sungyoung Lee 1 Kyung Hee University, Computer Engineering Department, Korea, {wangjin,

More information

Keyword: Cloud computing, service model, deployment model, network layer security.

Keyword: Cloud computing, service model, deployment model, network layer security. Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging

More information

Secure Cloud Computing through IT Auditing

Secure Cloud Computing through IT Auditing Secure Cloud Computing through IT Auditing 75 Navita Agarwal Department of CSIT Moradabad Institute of Technology, Moradabad, U.P., INDIA Email: nvgrwl06@gmail.com ABSTRACT In this paper we discuss the

More information

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks

More information

An Intelligent Framework for Vehicular Ad-hoc Networks using SDN Architecture

An Intelligent Framework for Vehicular Ad-hoc Networks using SDN Architecture 435 An Intelligent Framework for Vehicular Ad-hoc Networks using SDN Architecture Balamurugan.V School of Computing Science and Engineering, VIT University Chennai Campus, 600127, Tamilnadu, India. Abstract

More information

Problems of Security in Ad Hoc Sensor Network

Problems of Security in Ad Hoc Sensor Network Problems of Security in Ad Hoc Sensor Network Petr Hanáček * hanacek@fit.vutbr.cz Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless

More information

Data Integrity Check using Hash Functions in Cloud environment

Data Integrity Check using Hash Functions in Cloud environment Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology

More information

Cloud Computing for Agent-based Traffic Management Systems

Cloud Computing for Agent-based Traffic Management Systems Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion

More information

Module 1: Facilitated e-learning

Module 1: Facilitated e-learning Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1

More information

Research Projects in the Mobile Computing and Networking (MCN) Lab

Research Projects in the Mobile Computing and Networking (MCN) Lab Research Projects in the Mobile Computing and Networking (MCN) Lab Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University http://www.cse.psu.edu/~gcao Mobile Computing

More information

Intelligent Transportation System for Vehicular Ad-Hoc Networks

Intelligent Transportation System for Vehicular Ad-Hoc Networks Intelligent Transportation System for Vehicular Ad-Hoc Networks T. Sujitha 1, S. Punitha Devi 2 1,2 Department of CSE, P.A College of Engineering and Technology, Coimbatore, Tamilnadu Abstract - Vehicular

More information

Component 4: Introduction to Information and Computer Science. Topic III: Cloud Computing. Distributed computing

Component 4: Introduction to Information and Computer Science. Topic III: Cloud Computing. Distributed computing Component 4: Introduction to Information and Computer Science Unit 10: Future of Computing Lecture 2 This material was developed by Oregon Health & Science University, funded by the Department of Health

More information

CLOUD TECHNOLOGY IMPLEMENTATION/SECURITY

CLOUD TECHNOLOGY IMPLEMENTATION/SECURITY 1 CLOUD TECHNOLOGY IMPLEMENTATION/SECURITY Torrell Griffin 2 Cloud Technology Implementation/Risk Mitigation The purpose of this report, in essence, is to define cloud technology as well as describe some

More information

Cloud Computing: The Next Computing Paradigm

Cloud Computing: The Next Computing Paradigm Cloud Computing: The Next Computing Paradigm Ronnie D. Caytiles 1, Sunguk Lee and Byungjoo Park 1 * 1 Department of Multimedia Engineering, Hannam University 133 Ojeongdong, Daeduk-gu, Daejeon, Korea rdcaytiles@gmail.com,

More information

Seminar: Security Metrics in Cloud Computing (20-00-0577-se)

Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Technische Universität Darmstadt Dependable, Embedded Systems and Software Group (DEEDS) Hochschulstr. 10 64289 Darmstadt Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Topics Descriptions

More information

SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE

SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE 1 PARISHA TYAGI, 2 VIRENDRA KUMAR 1Department of Information Technology, Suresh Gyan Vihar University, Rajasthan, India 2 Department of

More information

Location Identification and Vehicle Tracking using VANET(VETRAC)

Location Identification and Vehicle Tracking using VANET(VETRAC) Location Identification and Vehicle Tracking using VANET(VETRAC) Supervisor Name: Md. Mosaddik Hasan Assistant Professor Dept. of CSE MBSTU Md. Al-Amin Nipu CE-10031 Dept. of CSE MBSTU Abstract: Large

More information

Security Threats on National Defense ICT based on IoT

Security Threats on National Defense ICT based on IoT , pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,

More information

Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009

Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Cloud Computing 159.735 Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Table of Contents Introduction... 3 What is Cloud Computing?... 3 Key Characteristics...

More information

Lecture 02a Cloud Computing I

Lecture 02a Cloud Computing I Mobile Cloud Computing Lecture 02a Cloud Computing I 吳 秀 陽 Shiow-yang Wu What is Cloud Computing? Computing with cloud? Mobile Cloud Computing Cloud Computing I 2 Note 1 What is Cloud Computing? Walking

More information

Video Capture Service in the Intelligent Transportation System based on Cloud Computing

Video Capture Service in the Intelligent Transportation System based on Cloud Computing Video Capture Service in the Intelligent Transportation System based on Cloud Computing Fekri M. Abduljalil Dept, of Computer Science, Faculty of Educ., Arts, and Science University of Sana a ABSTRACT

More information

Significance of Mobile Ad-hoc Networks in the Growth of Cloud Based Services

Significance of Mobile Ad-hoc Networks in the Growth of Cloud Based Services Significance of Mobile Ad-hoc Networks in the Growth of Cloud Based Services Aniket Deshpande* Faculty of Engineering and Technology, Mewar University, Chittorgarh, Rajasthan, India. *Tel: +91-99679-99779;

More information

A Survey of Cloud Based Health Care System

A Survey of Cloud Based Health Care System A Survey of Cloud Based Health Care System Chandrani Ray Chowdhury Assistant Professor, Dept. of MCA, SDET-Brainware Group of Institution, Barasat, West Bengal, India ABSTRACT: Cloud communicating is an

More information

An Ontology-Based Approach for Optimal Resource Allocation in Vehicular Cloud Computing

An Ontology-Based Approach for Optimal Resource Allocation in Vehicular Cloud Computing Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 2, February 2015,

More information

Implementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks

Implementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks Implementation and Evaluation of Certificate Revocation List Distribution for Vehicular Ad-hoc Networks Petra Ardelean advisor: Panos Papadimitratos January 2009 Abstract Vehicular Ad-hoc Networks (VANETs)

More information

Cloud Computing, and REST-based Architectures Reid Holmes

Cloud Computing, and REST-based Architectures Reid Holmes Material and some slide content from: - Software Architecture: Foundations, Theory, and Practice - Krzysztof Czarnecki Cloud Computing, and REST-based Architectures Reid Holmes Cloud precursors Grid Computing:

More information

Cloud Computing for SCADA

Cloud Computing for SCADA Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry

More information

Optimized and Secured Educlouds by Implementing Virtualization

Optimized and Secured Educlouds by Implementing Virtualization International Journal of Electronics and Computer Science Engineering 2404 Available Online at www.ijecse.org ISSN- 2277-1956 Optimized and Secured Educlouds by Implementing Virtualization R. Rajesh 1,

More information

Connected Vehicles: New Directions and Opportunities. AASHTO Connected Vehicle Task Force December 3, 2014 Irvine, CA. Leidos. All rights reserved.

Connected Vehicles: New Directions and Opportunities. AASHTO Connected Vehicle Task Force December 3, 2014 Irvine, CA. Leidos. All rights reserved. Connected Vehicles: New Directions and Opportunities AASHTO Connected Vehicle Task Force December 3, 2014 Irvine, CA N A T I O N A L S E C U R I T Y E N G I N E E R I N G H E A L T H S O L U T I O N S

More information

CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India

CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India CLOUD COMPUTING 1 Er. Simar Preet Singh, 2 Er. Anshu Joshi 1 Assistant Professor, Computer Science & Engineering, DAV University, Jalandhar, Punjab, India 2 Research Scholar, Computer Science & Engineering,

More information

[Sudhagar*, 5(5): May, 2016] ISSN: 2277-9655 Impact Factor: 3.785

[Sudhagar*, 5(5): May, 2016] ISSN: 2277-9655 Impact Factor: 3.785 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY AVOID DATA MINING BASED ATTACKS IN RAIN-CLOUD D.Sudhagar * * Assistant Professor, Department of Information Technology, Jerusalem

More information

Wireless Sensor Network: Challenges, Issues and Research

Wireless Sensor Network: Challenges, Issues and Research ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues

More information

International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-0056. Volume: 02 Issue: 05 Aug-2015 www.irjet.net p-issn: 2395-0072

International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-0056. Volume: 02 Issue: 05 Aug-2015 www.irjet.net p-issn: 2395-0072 Fear of Cloud Vinnakota Saran Chaitanya 1, G. Harshavardhan Reddy 2 1 UG Final year student, Department of Computer Science and Engineering, G. Pulla Reddy Engineering College, Andhra Pradesh, India 2

More information

About me & Submission details

About me & Submission details About me & Submission details Parveen Yadav Security Researcher aka Ethical Hacker. Working as a Freelancer. White Hat Hacking work. Few Recognitions :- Got listed my name in Google Hall of fame,amazon,paypal,adobe

More information

Inter-Vehicle P2P Cmmunication Experimental On-Board Terminal

Inter-Vehicle P2P Cmmunication Experimental On-Board Terminal Inter- PP Cmmunication Experimental On-Board Terminal T. Nishida, K. Eguchi Y. Okamoto Yokosuka ITS Research Center NiCT Kanagawa, Japan to-nishida@nict.go.jp T. Warabino, T. Ohseki, T. Fukuhara, K. Saito,

More information

The Trend and Challenges of Cloud Computing: A Literature Review

The Trend and Challenges of Cloud Computing: A Literature Review The Trend and Challenges of Cloud Computing: A Literature Review Doi:10.5901/ajis.2013.v2n10p9 Abstract Evwiekpaefe, Abraham E. Department of Mathematics, Computer Science Nigerian Defence Academy, Kaduna,

More information

Securing MANET Using Diffie Hellman Digital Signature Scheme

Securing MANET Using Diffie Hellman Digital Signature Scheme Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2

More information

How To Understand Cloud Usability

How To Understand Cloud Usability Published in proceedings of HCI International 2015 Framework for Cloud Usability Brian Stanton 1, Mary Theofanos 1, Karuna P Joshi 2 1 National Institute of Standards and Technology, Gaithersburg, MD,

More information

An Intelligent Approach for Data Fortification in Cloud Computing

An Intelligent Approach for Data Fortification in Cloud Computing An Intelligent Approach for Data Fortification in Cloud Computing Supriya Mandhare 1, Prof. A. K. Sen 2, Asso. Prof. Rajkumar Shende 3 1,3 Department of Computer Engineering, St. Francis Institute of Technology,

More information

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Professor Kai Hwang University of Southern California Presentation at Huawei Forum, Santa Clara, Nov. 8, 2014 Mobile Cloud Security

More information

yvette@yvetteagostini.it yvette@yvetteagostini.it

yvette@yvetteagostini.it yvette@yvetteagostini.it 1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work

More information

Performance Evaluation of VANETs with Multiple Car Crashes in Different Traffic Conditions

Performance Evaluation of VANETs with Multiple Car Crashes in Different Traffic Conditions Performance Evaluation of VANETs with Multiple Car Crashes in Different Traffic Conditions Georgios Charalampopoulos 1,2 and Tasos Dagiuklas 1 1. Dept. of Computer Science, Hellenic Open University, Greece,

More information

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)

More information

Security Issues In Cloud Computing and Countermeasures

Security Issues In Cloud Computing and Countermeasures Security Issues In Cloud Computing and Countermeasures Shipra Dubey 1, Suman Bhajia 2 and Deepika Trivedi 3 1 Department of Computer Science, Banasthali University, Jaipur, Rajasthan / India 2 Department

More information

FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS

FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS International Journal of Computer Engineering and Applications, Volume VIII, Issue II, November 14 FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS Saju Mathew 1, Dr.

More information

NCTA Cloud Architecture

NCTA Cloud Architecture NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,

More information

The Optimal Methods of IVC Routing Protocol for VANET

The Optimal Methods of IVC Routing Protocol for VANET The Optimal Methods of IVC Routing Protocol for VANET Bin TIAN, Kun-Mean HOU, Hongling SHI, Jianjin LI LIMOS Laboratory CNRS UMR 6158 Blaise Pascal University Clermont-Ferrand, France NICST2013: International

More information

CLOUD COMPUTING SECURITY CONCERNS

CLOUD COMPUTING SECURITY CONCERNS CLOUD COMPUTING SECURITY CONCERNS ABSTRACT ASMA GULAM MOHAMED Saveetha School of Engineering Cloud computing is set of resources including data storage, programs and hardware offered through the Internet.

More information

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer

More information

Student's Awareness of Cloud Computing: Case Study Faculty of Engineering at Aden University, Yemen

Student's Awareness of Cloud Computing: Case Study Faculty of Engineering at Aden University, Yemen Student's Awareness of Cloud Computing: Case Study Faculty of Engineering at Aden University, Yemen Samah Sadeq Ahmed Bagish Department of Information Technology, Faculty of Engineering, Aden University,

More information

Six ways to accelerate Android mobile application development

Six ways to accelerate Android mobile application development Six ways to accelerate Android mobile application Creating an integrated solution for collaboration among teams Contents 1 Weaving the invisible thread of innovation 2 Android : vast opportunities and

More information

Where in the Cloud are You? Session 17032 Thursday, March 5, 2015: 1:45 PM-2:45 PM Virginia (Sheraton Seattle)

Where in the Cloud are You? Session 17032 Thursday, March 5, 2015: 1:45 PM-2:45 PM Virginia (Sheraton Seattle) Where in the Cloud are You? Session 17032 Thursday, March 5, 2015: 1:45 PM-2:45 PM Virginia (Sheraton Seattle) Abstract The goal of this session is to understanding what is meant when we say Where in the

More information

Cloud Computing: Computing as a Service. Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad

Cloud Computing: Computing as a Service. Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad Cloud Computing: Computing as a Service Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad Abstract: Computing as a utility. is a dream that dates from the beginning from the computer

More information

EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications

EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications 7 th escar Embedded Security in Cars Conference November 24 25, 2009, Düsseldorf Dr.-Ing. Olaf Henniger, Fraunhofer SIT Darmstadt Hervé

More information

Towards Efficient Routing in Vehicular Ad Hoc Networks

Towards Efficient Routing in Vehicular Ad Hoc Networks Towards Efficient Routing in Vehicular Ad Hoc Networks Moez Jerbi*, Sidi-Mohammed Senouci* and Yacine Ghamri-Doudane** *France Telecom R&D, Core Network Laboratories, Lannion, France **Networks and Multimedia

More information

International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 ISSN 2278-7763

International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 ISSN 2278-7763 International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 Management of Wireless sensor networks using cloud technology Dipankar Mishra, Department of Electronics,

More information

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,

More information

Oracle Applications and Cloud Computing - Future Direction

Oracle Applications and Cloud Computing - Future Direction Oracle Applications and Cloud Computing - Future Direction February 26, 2010 03:00 PM 03:40 PM Presented By Subash Krishnaswamy skrishna@astcorporation.com Vijay Tirumalai vtirumalai@astcorporation.com

More information

An Introduction to Cloud Computing Concepts

An Introduction to Cloud Computing Concepts Software Engineering Competence Center TUTORIAL An Introduction to Cloud Computing Concepts Practical Steps for Using Amazon EC2 IaaS Technology Ahmed Mohamed Gamaleldin Senior R&D Engineer-SECC ahmed.gamal.eldin@itida.gov.eg

More information

Cloud Computing Trends

Cloud Computing Trends UT DALLAS Erik Jonsson School of Engineering & Computer Science Cloud Computing Trends What is cloud computing? Cloud computing refers to the apps and services delivered over the internet. Software delivered

More information

In the pursuit of becoming smart

In the pursuit of becoming smart WHITE PAPER In the pursuit of becoming smart The business insight into Comarch IoT Platform Introduction Businesses around the world are seeking the direction for the future, trying to find the right solution

More information

ACCESS DEFINED CLOUD BASED MULTIVARIANT RESPONSE SYSTEM WITH CACHING

ACCESS DEFINED CLOUD BASED MULTIVARIANT RESPONSE SYSTEM WITH CACHING ACCESS DEFINED CLOUD BASED MULTIVARIANT RESPONSE SYSTEM WITH CACHING G. Janaki 1, M. Menaka 2 1,2 Computer science Department, Kingston engineering college, (India) ABSTRACT In the recent trends of computer

More information

VEHICLE TRACKING SYSTEM USING GPS. 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune. 2 Asst. Professor, SCOE, Vadgaon, Pune

VEHICLE TRACKING SYSTEM USING GPS. 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune. 2 Asst. Professor, SCOE, Vadgaon, Pune VEHICLE TRACKING SYSTEM USING GPS Pooja P. Dehankar 1, 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune Prof. S. P. Potdar 2 2 Asst. Professor, SCOE, Vadgaon, Pune Abstract- Global Positioning System is

More information

ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Analogous

More information

How To Compare Resource Allocation In Cloud Computing

How To Compare Resource Allocation In Cloud Computing An Efficient Resource Allocation Strategies in Cloud Computing B.Rajasekar 1,S.K.Manigandan 2 Final Year MCA Student, VelTech HighTech Engineering College, Chennai, India 1 Assistant Professor, VelTech

More information

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University

More information

Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST

Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST Future of Cloud Computing Irena Bojanova, Ph.D. UMUC, NIST No Longer On The Horizon Essential Characteristics On-demand Self-Service Broad Network Access Resource Pooling Rapid Elasticity Measured Service

More information

A Comparative Study of cloud and mcloud Computing

A Comparative Study of cloud and mcloud Computing A Comparative Study of cloud and mcloud Computing Ms.S.Gowri* Ms.S.Latha* Ms.A.Nirmala Devi* * Department of Computer Science, K.S.Rangasamy College of Arts and Science, Tiruchengode. s.gowri@ksrcas.edu

More information

CLOUD COMPUTING. A Primer

CLOUD COMPUTING. A Primer CLOUD COMPUTING A Primer A Mix of Voices The incredible shrinking CIO CIO Magazine, 2004 IT Doesn t Matter, The cloud will ship service outside the institution and ship power from central IT groups to

More information

Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station

Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station What is Cloud Computing? http://www.agent-x.com.au/ Wikipedia - the use of computing resources (hardware and software)

More information

Cloud Computing and Amazon Web Services

Cloud Computing and Amazon Web Services Cloud Computing and Amazon Web Services Gary A. McGilvary edinburgh data.intensive research 1 OUTLINE 1. An Overview of Cloud Computing 2. Amazon Web Services 3. Amazon EC2 Tutorial 4. Conclusions 2 CLOUD

More information

Role of Cloud Computing in Education

Role of Cloud Computing in Education Role of Cloud Computing in Education Kiran Yadav Assistant Professor, Dept. of Computer Science. Govt. College for Girls, Gurgaon, India ABSTRACT: Education plays an important role in maintaining the economic

More information

Cloud Computing Training

Cloud Computing Training Cloud Computing Training TechAge Labs Pvt. Ltd. Address : C-46, GF, Sector 2, Noida Phone 1 : 0120-4540894 Phone 2 : 0120-6495333 TechAge Labs 2014 version 1.0 Cloud Computing Training Cloud Computing

More information

Communication and Embedded Systems: Towards a Smart Grid. Radu Stoleru, Alex Sprintson, Narasimha Reddy, and P. R. Kumar

Communication and Embedded Systems: Towards a Smart Grid. Radu Stoleru, Alex Sprintson, Narasimha Reddy, and P. R. Kumar Communication and Embedded Systems: Towards a Smart Grid Radu Stoleru, Alex Sprintson, Narasimha Reddy, and P. R. Kumar Alex Sprintson Smart grid communication Key enabling technology Collecting data Control

More information

Analysis and Research of Cloud Computing System to Comparison of Several Cloud Computing Platforms

Analysis and Research of Cloud Computing System to Comparison of Several Cloud Computing Platforms Volume 1, Issue 1 ISSN: 2320-5288 International Journal of Engineering Technology & Management Research Journal homepage: www.ijetmr.org Analysis and Research of Cloud Computing System to Comparison of

More information

Overview. The Cloud. Characteristics and usage of the cloud Realities and risks of the cloud

Overview. The Cloud. Characteristics and usage of the cloud Realities and risks of the cloud Overview The purpose of this paper is to introduce the reader to the basics of cloud computing or the cloud with the aim of introducing the following aspects: Characteristics and usage of the cloud Realities

More information