INTEROPERABLE FEATURES CLASSIFICATION TECHNIQUE FOR CLOUD BASED APPLICATION USING FUZZY SYSTEMS
|
|
- Griffin Anthony
- 8 years ago
- Views:
Transcription
1 INTEROPERABLE FEATURES CLASSIFICATION TECHNIQUE FOR CLOUD BASED APPLICATION USING FUZZY SYSTEMS * C. Saravanakumar 1 and C. Arun 2 1 Department of Computer Science and Engineering, Sathyabama University, Chennai,Tamil nadu, India 2 Department of Electronics and Communication Engineering, R.M.K College of Engineering and Technology, Chennai, Tamil nadu, India *Author for Correspondence ABSTRACT Nowadays cloud computing plays a vital role in internet computing through the service oriented paradigm. The Cloud Service User (CSU) has requested the services from the Cloud Service Provider (CSP) for accessing the services which are deployed at the cloud environment. There are plenty of services available in the cloud which are provides the same serviceslike an image editing software. These software services will not provide a complete service to the requesting customer which leads the customer retention problem. The existing techniques are based on a single service provider who provides the service. Once the CSU selects the CSP for the service which are not gets full features required to process the request i.e. not complete solution. The interoperability has been achieved for satisfying the user for collaborating various service providers with complete solution. A Common Deployment Model (CDM) has been introduced with various functions for providing the QoS service to the customers. The proposed method focuses on the classification of the features based on fuzzy systems. This fuzzy classification method has implemented in the CDM which classifies the users along with their features for effective cloud interaction. The architecture of the proposed work provides a complete solution for the cloud based application. The Fuzzy Inference System has been implemented to classify the users with their access level. The member ship value is identified to classifythe user in three categories they are basic user, normal user and advanced user. In future this technique can be implemented the cloud security and privacy for protecting the customer s data. Keywords: CDM, Fuzzy systems, Interoperability, Cloud Computing and Fuzzy Classification INTRODUCTION Cloud computing grows enormously due the growth of internet and related development. The cloud computing is a service oriented computing which provides the service to the customer with on demand property. The origin of cloud computing is a desktop computing which is used only for developing a standalone application. The clientserver model has been introduced to share the data among the services followed by the distributed computing, collaborative computing etc., isalso a computing which comes before the cloud computing. There are various service models exists in the cloud computing namely SaaS (Software as a Service), PaaS (Platform as a Service), IaaS (Infrastructure as a Service). These services are deployed into the deployment models such as public cloud, private cloud, hybrid cloud and community cloud. These models are related to various parameters such as limit of access, capacity, security, reliability, trust and privacy of the cloud computing. Normally the CSU depends on a single CSP who cannot get a complete set of features for their current requirement. This problem leads the customer will not free to change the CSP, so the issue causes a customer retention problem. The one and only solution is interoperability which means that various CSP s can able give their services to enhancing the ability by establishing the Service Level Agreement (SLA) (Reddy et al., 2009). This is the contract among the CSP s who are not concentrates the different enhancement but they only target the revenues.there are many standards exits over interoperability of the cloud which are classified in to intercloud interoperability standards and internal cloud interoperability standards. The issues in these standards are solved by establishing the transport mechanism among the virtual machine (Lewis, 2012) and to develop an API s for creating an interface with IaaS cloud (OFG, 2013) and to standardize the cloud storage interactions (Kresimir & Zeljko, 2010). The CDM has been introduced with various functions namely security management, service management, location awarenessover cloud computing, traffic shaping and SLA management (Saravanakumar & Arun, 2011, 2012, 2013). These features are used to standardize the cloud services in order to achieve maximum retention of the customer with high quality. Fuzzy keyword search overcomes the problem of traditional plain keyword search to protect the cloud data in an accurate manner. This technique is not suitable for complex natural language and multiple semantics over the secured data (Syeda & Rangaraju, 2013). The fuzzy keyword searching with safe index is proposed for searching data in large dataset by using bloom filter. The size of the fuzzy set is large so the efficiency will be reduced so this will be carried out carefully to achieve quality response (Lixi et al., 2013). The fuzzy logic over cloud computing gives an 84
2 interoperability among various organizations for accessing a huge amount of data and also improves the accessibility of mobile cloud. This system is not suitable for precise and imprecise data (Rinku & Jasutkar, 2012). The fuzzy keyword search displays a similarity keyword and also achieves maximum security and preserve the cloud data. It is not suitable for conjunction of keywords and sequence of keywords to achieve relevancy in the search result (Ranjeeth Kumar & Vasumathi, 2011). The challenging issue of cloud computing is solved by introducing a novel load balancing algorithm with fuzzy logic over various cloud elements. The Fuzzy Based Round Robin load balancing algorithm compares and proves better result than the Round Robin load algorithm (Sethi et al., 2012).The K-grams based fuzzy keyword search has been introduced to solve the issues like spelling errors and morphological variant used in the searching process (Wei et al., 2013). The existing work fully based on the searching of data which are hosted in the cloud using keywords selected by the customer. These works are not addressed in the classification of data and the customer with their access level. The proposed work focuses on the fuzzy based classification and prediction of application features and it selects a suitable service for the customer. The customer doesn t know about the quality of the services which comes from the cloud computing end. The request of the cloud comes from various sources i.e customers who need the services. The proposed work classifies the user according to their access level namely basic user, normal user and advanced user. The basic user request only minimum features supported for the cloud request. The normal user requests the service with some conditions whereas the advanced user needs only maximum features supported by the application. The features are extracted from the cloud and classify the features using the fuzzy systems. These classified features are then selected for further prediction. The main objective of the proposed work is to select the suitable services in order to achieve a high quality service response to the customer. The paper is organized as follows; Section 1 represents the overview of cloud computing and related concepts. Section 2 describes the system of fuzzy based feature classification. Section3 represents the architecture diagram of the proposed system. Section 4 represents the implementation of fuzzy inference system. Section 5 proposed the method of the cloud service support using fuzzy system. Finally, Section 6 represents conclusion and future work. FUZZY BASED FEATURE CLASSIFICATION SYSTEM Fig. 1 shows that the fuzzy based feature classification system. In the cloud computing concept there are various application gives the same service. Suppose the customer needs the software to edit an image will generate the requests to the cloud. The customer should know about the application quality and accuracy. This parameter mainly depends up on the response from the CSP which gives the application with maximum features. Fuzzy based Feature Classification Application Selection Feature Selection Feature Prediction Feature Classification Feature Extraction Figure 1: Fuzzy based Feature Classification System The application selection is the first and foremost step in the proposed work. The features are extracted from the selected cloud application. The extracted features need to be assigning the membership value for classification. These membership values are identified on based the user access level. The features are compared with the features which are identified during the cloud request. The features are predicted for an efficient cloud response and also for customer retention. 85
3 ARCHITECTURE OF THE PROPOSED SYSTEM The CSU requests a service from the CSP by generating the cloud request which are handled by the deployment controller. The CDM is available in the deployment controller which provides various functions such as management of security, traffic shaping, service management, location awareness of cloud storage etc. The proposed method focuses on the fuzzy based feature classification are also included in the CDM. The main objective of the proposed work is to classify the users based on the strength of the access level. Normally the user has classified as a basic user, normal user and advanced user. These classifications are based on the features which are extracted from the cloud application. The extracted features are identified as a separate group based on their member ship values. The membership value of the basic user is identified with the minimum number of features selected by the user. The member ship value of the advanced user is identified with maximum number of features which are selected by the user whereas the normal users have some set of features. Figure 2: Architecture of the proposed system Fig. 2 describes the architecture diagram of the proposed work. The flow of the work is organized are as follows 1) the CSU request the cloud service 2) the credentials required for the cloud interaction is requested 3) credentials are send to the deployment controller 4) fuzzy based classification are carried out 5) the cloud response are send to the CSU. Fuzzy based feature classification method first selects the applications which are requested by the CSU and the features are extracted from the cloud storage. The extracted features are classified based on the fuzzy membership value and then the features are predicted. The prediction is used to assess the relevancy of the cloud application in order to achieve maximum customer retention. IMPLEMENTATION USING FUZZY INFERENCE SYSTEM Most real-world problems are represented as logic to process incomplete, imprecise, vague or uncertain information. If two valued logic is not suitable for real time environments, the fuzzy logic and fuzzy sets may give formal tools for uncertain information. The certainty of an element over the set can be represented using the membership function with related variables. A membership function is referred to the characteristic function of the fuzzy set. The Membership functions of fuzzy sets are represented in different shapes with the range of {0, 1}. In fuzzy system the dynamic behavior of the system can be categorized by fuzzy rules. Fuzzy rules are simple if-then rules i.e., the condition part referred as ancedents where as the conclusion part is called as consequent. The rules are applied into the FIS (Fuzzy Inference System) for further processing of fuzzy sets. FIS consists of fuzzification process, inference engine, defuzzification process, knowledge base, input and output sets. There are two FIS are most commonly used namely Mamdani and Takagi-Sugeno fuzzy Controller. Mamdani fuzzy controller is used in this implementation. A Centroid method of defuzzification process can be used for converting a fuzzy result set into 86
4 fuzzy output (Engelbrecht, 2007). The cloud application features are classified and predicted using the fuzzy system with related logic. An application features are classified into three main classes of the users based on the level of accessibility on cloud based word application they are basic user, normal user and advanced user. The basic user can able to use the cloud based word processing application with only basic features like creating, editing, printing etc., The Normal user can able to use the cloud based word processing services with basic features with some extra features like sharing, portability etc., An advanced user can use the full features in the cloud application. The goal of these classifications is to improve the quality of services for the cloud customer from the unnecessary ambiguous in service selection. The following work describes an implementation result of the cloud interoperability over cloud based word processing application. CLOUD SERVICE SUPPORT USING FUZZY SYSTEM The actual service supports the cloud based applications are shown in Fig. 3 which lacksin the usage application features in various cloud users. The membership value is calculated based on the fuzzy rules fixed using the MATLAB software. The lower and upper bound of the membership value is fixed based on the fuzzy rules. The membership value of the basic user is identified based on the features selected by the user. The range of service support is from 0.14 to 0.29 gives minimum feature count to the current cloud request. The lower bound value of the entire application request of various users is starts from 0.14 to The user category falls into the given range based on the features selected by the users. The following membership functions are identified based on the values of the upper and lower bound of the service support. The membership functions of cloud service can be specified are as follows,... (1) (2) (3) (4) (5) Figure 3: Service Support map on cloud based word processing application 87
5 The features will not support while it exceeds the value 0.71 i.e. the result leads to cloud features unavailability. According to the result, the service will not support to the Cloud Service Users at certain limit, so the cloud services offered by the CSP to CSU is possible with interoperability. CONCLUSION AND FUTURE WORK Cloud computing provide the services to the customers for getting an effective and efficient access of their requirement. There are various services available in the cloud computing which are related to the CSP. The customer depends upon a single CSP who never gets complete services because not all the CSP provides the solution. The interoperability is the main solution for collaborating various CSP who provides a complete solution. CDM gives the solution for interoperability with various features which also deployed over deployment manger. The classification of the users with access level is important then only the level of interoperability is fixed. The proposed work focused on the classification of the users and features using the fuzzy systems. The membership value is calculated and then identified by the user with their access level. The fuzzy classification is used to select the application, extract the features, select the features and predict the features. These features provide a reliable service to the user in order to retain the customers. The implementation of interoperability can be achieved by using the fuzzy inference system with fuzzy rules. The fuzzy based classification method will be extended to the cloud security and privacy with high reliability. REFERENCES Engelbrecht PA (2007). Computational Intelligence: An Introduction. 2 nd Edition, University of Pretoria, South Africa Kresimir P & Zeljko H (2010). Cloud Computing Security Issues and Challenges. MIPRO, May 24-28,Opatija, Croatia Lewis GA (2012).The Role of Standards in Cloud Computing Interoperability. TECHNICAL NOTE,CMU/SEI TN-012,Research Technology, and System Solutions Program, Carnegie Mellon University, Available at: 14 August 2013). Lixi Liu, Chi Zhang, Shaowen Yao, Shipu Wang & Wei Zhou (2013). Fuzzy Keyword Search with Safe Index over Encrypted Cloud Computing. TELKOMNIKA, 11(10) OGF (2013). About Open Grid Forum. Available at: (Accessed 14 August 2013). RanjeethKumar M & Vasumathi D (2011). A novel implementation of fuzzy keyword search over encrypted data in cloud computing. International Journal of Computer Trends and Technology, Reddy BK, Ramacrishna Paturi V & Atanu R (2009). Cloud Security Issues. IEEE International Conference on Services Computing Rinku R& Jasutkar RW (2012). Fuzzy approach to mobile cloud computing. International Journal of Recent Technology and Engineering, 1(2) Saravanakumar C & Arun C (2012). Secure Framework for publishing and accessing the cloud services with common deployment. European Journal of Scientific Research, 1-8. Saravanakumar C & Arun C (2012). Traffic analysis and shaping of the cloud services over common deployment model using cloud analyst. International Journal of Computer Applications, 43(4) Saravanakumar C & Arun C (2012). Instance management for software application of the cloud over common deployment model. Emerging Trends in Science, Engineering and Technology Saravanakumar C & Arun C (2013). Location awareness of the cloud storage with trust management using common deployment model. ICCCNT IEEE. Saravanakumar C & Arun C (2011).Interaction among Cloud Services on Common Software Application with Service Level Agreement. International Journal of Electronics Communication and Computer Engineering, 2(2) 1-4. Sethi S, Sahu A & Jena SK (2012). Efficient load balancing in cloud computing using fuzzy logic. IOSR Journal of Engineering, 2(7) Syeda Farha Shazmeen & Rangaraju D (2013). Using different searching schemas for fuzzy keyword search over cloud data. Graduate Research in Engineering and Technology: An International Journal, 1(2) Wei Zhou, Lixi Liu, He Jing, Chi Zhang, Shaowen Yao & Shipu Wang (2013). K-Gram based fuzzy keyword search over encrypted cloud computing. Journal of Software Engineering and Applications,
EFFICIENT FEATURES EXTRACTION TECHNIQUE FOR CLOUD BASED APPLICATION WITH INTEROPERABILITY USING EVOLUTIONARY COMPUTING
EFFICIENT FEATURES EXTRACTION TECHNIQUE FOR CLOUD BASED APPLICATION WITH INTEROPERABILITY USING EVOLUTIONARY COMPUTING * C. Saravanakumar and C. Arun 1 Department of Computer Science and Engineering, Sathyabama
More informationEstimating Trust Value for Cloud Service Providers using Fuzzy Logic
Estimating Trust Value for Cloud Service Providers using Fuzzy Logic Supriya M, Venkataramana L.J, K Sangeeta Department of Computer Science and Engineering, Amrita School of Engineering Kasavanahalli,
More informationTable of Contents. Abstract... Error! Bookmark not defined. Chapter 1... Error! Bookmark not defined. 1. Introduction... Error! Bookmark not defined.
Table of Contents Abstract... Error! Bookmark not defined. Chapter 1... Error! Bookmark not defined. 1. Introduction... Error! Bookmark not defined. 1.1 Cloud Computing Development... Error! Bookmark not
More informationA Trust-Evaluation Metric for Cloud applications
A Trust-Evaluation Metric for Cloud applications Mohammed Alhamad, Tharam Dillon, and Elizabeth Chang Abstract Cloud services are becoming popular in terms of distributed technology because they allow
More informationCloud Computing Services and its Application
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 1 (2014), pp. 107-112 Research India Publications http://www.ripublication.com/aeee.htm Cloud Computing Services and its
More informationCloud deployment model and cost analysis in Multicloud
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) ISSN: 2278-2834, ISBN: 2278-8735. Volume 4, Issue 3 (Nov-Dec. 2012), PP 25-31 Cloud deployment model and cost analysis in Multicloud
More informationN TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,
More informationA QoS-Aware Web Service Selection Based on Clustering
International Journal of Scientific and Research Publications, Volume 4, Issue 2, February 2014 1 A QoS-Aware Web Service Selection Based on Clustering R.Karthiban PG scholar, Computer Science and Engineering,
More informationHierarchical Trust Model to Rate Cloud Service Providers based on Infrastructure as a Service
Hierarchical Model to Rate Cloud Service Providers based on Infrastructure as a Service Supriya M 1, Sangeeta K 1, G K Patra 2 1 Department of CSE, Amrita School of Engineering, Amrita Vishwa Vidyapeetham,
More informationA Comparative Study of Load Balancing Algorithms in Cloud Computing
A Comparative Study of Load Balancing Algorithms in Cloud Computing Reena Panwar M.Tech CSE Scholar Department of CSE, Galgotias College of Engineering and Technology, Greater Noida, India Bhawna Mallick,
More informationCloud Computing Standards: Overview and ITU-T positioning
ITU Workshop on Cloud Computing (Tunis, Tunisia, 18-19 June 2012) Cloud Computing Standards: Overview and ITU-T positioning Dr France Telecom, Orange Labs Networks & Carriers / R&D Chairman ITU-T Working
More informationIntuitionistic fuzzy load balancing in cloud computing
8 th Int. Workshop on IFSs, Banská Bystrica, 9 Oct. 2012 Notes on Intuitionistic Fuzzy Sets Vol. 18, 2012, No. 4, 19 25 Intuitionistic fuzzy load balancing in cloud computing Marin Marinov European Polytechnical
More informationGrid Computing Vs. Cloud Computing
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 577-582 International Research Publications House http://www. irphouse.com /ijict.htm Grid
More informationHow To Perform Load Balancing In Cloud Computing With An Agent
A New Approach for Dynamic Load Balancing in Cloud Computing Anjali 1, Jitender Grover 2, Manpreet Singh 3, Charanjeet Singh 4, Hemant Sethi 5 1,2,3,4,5 (Department of Computer Science & Engineering, MM
More informationQOS Based Web Service Ranking Using Fuzzy C-means Clusters
Research Journal of Applied Sciences, Engineering and Technology 10(9): 1045-1050, 2015 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2015 Submitted: March 19, 2015 Accepted: April
More informationAuthentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered
More informationA Quality Model for E-Learning as a Service in Cloud Computing Framework
A Quality Model for E-Learning as a Service in Cloud Computing Framework Dr Rajni Jindal Professor, Department of IT Indira Gandhi Institute of Technology, New Delhi, INDIA rajnijindal@dce.ac.in Alka Singhal
More informationFederation of Cloud Computing Infrastructure
IJSTE International Journal of Science Technology & Engineering Vol. 1, Issue 1, July 2014 ISSN(online): 2349 784X Federation of Cloud Computing Infrastructure Riddhi Solani Kavita Singh Rathore B. Tech.
More informationOn Premise Vs Cloud: Selection Approach & Implementation Strategies
On Premise Vs Cloud: Selection Approach & Implementation Strategies Session ID#:10143 Prepared by: Praveen Kumar Practice Manager AST Corporation @Praveenk74 REMINDER Check in on the COLLABORATE mobile
More informationKeywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing
Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Survey on Load
More informationEfficient load Balancing in Cloud Computing using Fuzzy Logic
IOSR Journal of Engineering (IOSRJEN) ISSN: 2250-3021 Volume 2, Issue 7(July 2012), PP 65-71 Efficient load Balancing in Cloud Computing using Fuzzy Logic Srinivas Sethi 1, Anupama Sahu 2 Suvendu Kumar
More informationCloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1
Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1 M.Tech Dept. of Computer Science, IPEC, Ghaziabad, U.P. 2 Professor, Dept. of Computer science, IPEC, Ghaziabad, U.P. Abstract:
More informationWHAT DOES IT SERVICE MANAGEMENT LOOK LIKE IN THE CLOUD? An ITIL based approach
WHAT DOES IT SERVICE MANAGEMENT LOOK LIKE IN THE CLOUD? An ITIL based approach Marc Jansen Computer Science Institute University of Applied Sciences Ruhr West Tannenstr. 43, 46240 Bottrop Germany marc.jansen@hs-ruhrwest.de
More informationDESIGN AND STRUCTURE OF FUZZY LOGIC USING ADAPTIVE ONLINE LEARNING SYSTEMS
Abstract: Fuzzy logic has rapidly become one of the most successful of today s technologies for developing sophisticated control systems. The reason for which is very simple. Fuzzy logic addresses such
More informationPerformance Gathering and Implementing Portability on Cloud Storage Data
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 17 (2014), pp. 1815-1823 International Research Publications House http://www. irphouse.com Performance Gathering
More informationMonitoring Performances of Quality of Service in Cloud with System of Systems
Monitoring Performances of Quality of Service in Cloud with System of Systems Helen Anderson Akpan 1, M. R. Sudha 2 1 MSc Student, Department of Information Technology, 2 Assistant Professor, Department
More informationRole of Cloud Computing to Overcome the Issues and Challenges in E-learning
Journal of Basic and Applied Engineering Research pp. 66-70 Krishi Sanskriti Publications http://www.krishisanskriti.org/jbaer.html Role of Cloud Computing to Overcome the Issues and Challenges in E-learning
More informationA NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,
More informationReallocation and Allocation of Virtual Machines in Cloud Computing Manan D. Shah a, *, Harshad B. Prajapati b
Proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA-14) Reallocation and Allocation of Virtual Machines in Cloud Computing Manan
More informationAEIJST - June 2015 - Vol 3 - Issue 6 ISSN - 2348-6732. Cloud Broker. * Prasanna Kumar ** Shalini N M *** Sowmya R **** V Ashalatha
Abstract Cloud Broker * Prasanna Kumar ** Shalini N M *** Sowmya R **** V Ashalatha Dept of ISE, The National Institute of Engineering, Mysore, India Cloud computing is kinetically evolving areas which
More informationRole of Cloud Computing in Big Data Analytics Using MapReduce Component of Hadoop
Role of Cloud Computing in Big Data Analytics Using MapReduce Component of Hadoop Kanchan A. Khedikar Department of Computer Science & Engineering Walchand Institute of Technoloy, Solapur, Maharashtra,
More informationFuzzy Logic Based Revised Defect Rating for Software Lifecycle Performance. Prediction Using GMR
BIJIT - BVICAM s International Journal of Information Technology Bharati Vidyapeeth s Institute of Computer Applications and Management (BVICAM), New Delhi Fuzzy Logic Based Revised Defect Rating for Software
More informationLOAD BALANCING IN CLOUD COMPUTING
LOAD BALANCING IN CLOUD COMPUTING Neethu M.S 1 PG Student, Dept. of Computer Science and Engineering, LBSITW (India) ABSTRACT Cloud computing is emerging as a new paradigm for manipulating, configuring,
More informationEvaluation Model for Internet Cloud Data Structure Audit System
Evaluation Model for Internet Data Structure Audit System Wang Fan School of Accounting Zhejiang Gongshang University Hangzhou, 310018, P. R.China wangfanswcd@126.com Journal of Digital Information Management
More informationThreat Modeling Using Fuzzy Logic Paradigm
Issues in Informing Science and Information Technology Volume 4, 2007 Threat Modeling Using Fuzzy Logic Paradigm A. S. Sodiya, S. A. Onashoga, and B. A. Oladunjoye Department of Computer Science, University
More informationCLOUD COMPUTING OVERVIEW
CLOUD COMPUTING OVERVIEW http://www.tutorialspoint.com/cloud_computing/cloud_computing_overview.htm Copyright tutorialspoint.com Cloud Computing provides us a means by which we can access the applications
More informationHomomorphic Encryption Schema for Privacy Preserving Mining of Association Rules
Homomorphic Encryption Schema for Privacy Preserving Mining of Association Rules M.Sangeetha 1, P. Anishprabu 2, S. Shanmathi 3 Department of Computer Science and Engineering SriGuru Institute of Technology
More informationElasticity in Multitenant Databases Through Virtual Tenants
Elasticity in Multitenant Databases Through Virtual Tenants 1 Monika Jain, 2 Iti Sharma Career Point University, Kota, Rajasthan, India 1 jainmonica1989@gmail.com, 2 itisharma.uce@gmail.com Abstract -
More informationCloud Computing and Business Intelligence
Database Systems Journal vol. V, no. 4/2014 49 Cloud Computing and Business Intelligence Alexandru Adrian TOLE Romanian American University, Bucharest, Romania adrian.tole@yahoo.com The complexity of data
More informationA Strawman Model. NIST Cloud Computing Reference Architecture and Taxonomy Working Group. January 3, 2011
A Strawman Model NIST Cloud Computing Reference Architecture and Taxonomy Working Group January 3, 2011 Objective Our objective is to define a neutral architecture consistent with NIST definition of cloud
More informationAn enhanced QoS Architecture based Framework for Ranking of Cloud Services
An enhanced QoS Architecture based Framework for Ranking of Cloud Services Mr.K.Saravanan #1, M.Lakshmi Kantham #2 1 Assistant Professor, 2 PG Scholar Department of Computer Science and Engineering Anna
More informationHybrid Load Balancing Algorithm in Heterogeneous Cloud Environment
Hybrid Load Balancing Algorithm in Heterogeneous Cloud Environment Hafiz Jabr Younis, Alaa Al Halees, Mohammed Radi Abstract Cloud computing is a heterogeneous environment offers a rapidly and on-demand
More informationCloud Computing: Emphasizing Hybrid Cloud Computing on Android Computing Platform An Overview
International Journal of Applied Sciences & Engineering (IJASE) 1(1): April, 2013 21-27 Cloud Computing: Emphasizing Hybrid Cloud Computing on Android Computing Platform An Overview Prantosh, K. Paul 1*,
More informationFundamental Concepts and Models
Fundamental Concepts and Models 1 1. Roles and Boundaries Could provider The organization that provides the cloud based IT resources Cloud consumer An organization (or a human) that has a formal contract
More informationAn Efficient Adaptive Load Balancing Algorithm for Cloud Computing Under Bursty Workloads
Engineering, Technology & Applied Science Research Vol. 5, No. 3, 2015, 795-800 795 An Efficient Adaptive Load Balancing Algorithm for Cloud Computing Under Bursty Workloads Sally F. Issawi Faculty of
More informationSecure Cloud Computing through IT Auditing
Secure Cloud Computing through IT Auditing 75 Navita Agarwal Department of CSIT Moradabad Institute of Technology, Moradabad, U.P., INDIA Email: nvgrwl06@gmail.com ABSTRACT In this paper we discuss the
More informationEFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM Macha Arun 1, B.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Holy Mary
More informationHow To Improve Cloud Computing With An Ontology System For An Optimal Decision Making
International Journal of Computational Engineering Research Vol, 04 Issue, 1 An Ontology System for Ability Optimization & Enhancement in Cloud Broker Pradeep Kumar M.Sc. Computer Science (AI) Central
More informationSupply Chain Platform as a Service: a Cloud Perspective on Business Collaboration
Supply Chain Platform as a Service: a Cloud Perspective on Business Collaboration Guopeng Zhao 1, 2 and Zhiqi Shen 1 1 Nanyang Technological University, Singapore 639798 2 HP Labs Singapore, Singapore
More informationSECURITY ARCHITECTURE FOR MOBILE CLOUD COMPUTING
SECURITY ARCHITECTURE FOR MOBILE CLOUD COMPUTING Ali Newaz Bahar 1*, Md. Ahsan Habib 2, Md. Manowarul Islam 3 1, 2, 3 Department of Information and Communication Technology, Mawlana Bhashani Science and
More informationA Novel Approach for Efficient Load Balancing in Cloud Computing Environment by Using Partitioning
A Novel Approach for Efficient Load Balancing in Cloud Computing Environment by Using Partitioning 1 P. Vijay Kumar, 2 R. Suresh 1 M.Tech 2 nd Year, Department of CSE, CREC Tirupati, AP, India 2 Professor
More informationA Demonstration of a Robust Context Classification System (CCS) and its Context ToolChain (CTC)
A Demonstration of a Robust Context Classification System () and its Context ToolChain (CTC) Martin Berchtold, Henning Günther and Michael Beigl Institut für Betriebssysteme und Rechnerverbund Abstract.
More informationINTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
More informationProof of Retrivability: A Third Party Auditor Using Cloud Computing
Proof of Retrivability: A Third Party Auditor Using Cloud Computing Vijayaraghavan U 1, Madonna Arieth R 2, Geethanjali K 3 1,2 Asst. Professor, Dept of CSE, RVS College of Engineering& Technology, Pondicherry
More informationAnalysis of Job Scheduling Algorithms in Cloud Computing
Analysis of Job Scheduling s in Cloud Computing Rajveer Kaur 1, Supriya Kinger 2 1 Research Fellow, Department of Computer Science and Engineering, SGGSWU, Fatehgarh Sahib, India, Punjab (140406) 2 Asst.Professor,
More informationHome Appliance Control and Monitoring System Model Based on Cloud Computing Technology
Home Appliance Control and Monitoring System Model Based on Cloud Computing Technology Yun Cui 1, Myoungjin Kim 1, Seung-woo Kum 3, Jong-jin Jung 3, Tae-Beom Lim 3, Hanku Lee 2, *, and Okkyung Choi 2 1
More informationInternational Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 6, June 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationMobile Storage and Search Engine of Information Oriented to Food Cloud
Advance Journal of Food Science and Technology 5(10): 1331-1336, 2013 ISSN: 2042-4868; e-issn: 2042-4876 Maxwell Scientific Organization, 2013 Submitted: May 29, 2013 Accepted: July 04, 2013 Published:
More informationA Survey on Trust Based Security and Privacy Issues of Cloud Computing Framework
A Survey on Trust Based Security and Privacy Issues of Cloud Computing Framework Usvir Kaur 1 Dr. Dheerendra Singh 2 Assistant Professor, Dept. of Computer Science & Engineering, Sri Guru Granth Sahib
More informationInternational Journal of Computer Sciences and Engineering Open Access. Hybrid Approach to Round Robin and Priority Based Scheduling Algorithm
International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-2 E-ISSN: 2347-2693 Hybrid Approach to Round Robin and Priority Based Scheduling Algorithm Garima Malik
More informationA Study on Service Oriented Network Virtualization convergence of Cloud Computing
A Study on Service Oriented Network Virtualization convergence of Cloud Computing 1 Kajjam Vinay Kumar, 2 SANTHOSH BODDUPALLI 1 Scholar(M.Tech),Department of Computer Science Engineering, Brilliant Institute
More informationClassification of Fuzzy Data in Database Management System
Classification of Fuzzy Data in Database Management System Deval Popat, Hema Sharda, and David Taniar 2 School of Electrical and Computer Engineering, RMIT University, Melbourne, Australia Phone: +6 3
More informationData Storage and Synchronization in Private Cloud
Data Storage and Synchronization in Private Cloud D. Hodanić, N.Vrkić and M. Tomić University of Rijeka, Faculty of Engineering, Department of Computer Engineering, Rijeka, Croatia {dhodanic, nvrkic, mtomic}@riteh.hr
More informationDistributed Framework for Data Mining As a Service on Private Cloud
RESEARCH ARTICLE OPEN ACCESS Distributed Framework for Data Mining As a Service on Private Cloud Shraddha Masih *, Sanjay Tanwani** *Research Scholar & Associate Professor, School of Computer Science &
More informationIndian Journal of Science International Weekly Journal for Science ISSN 2319 7730 EISSN 2319 7749 2015 Discovery Publication. All Rights Reserved
Indian Journal of Science International Weekly Journal for Science ISSN 2319 7730 EISSN 2319 7749 2015 Discovery Publication. All Rights Reserved Analysis Web enabled cloud library system: a conceptual
More informationOptimization and Ranking in Web Service Composition using Performance Index
Optimization and Ranking in Web Service Composition using Performance Index Pramodh N #1, Srinath V #2, Sri Krishna A #3 # Department of Computer Science and Engineering, SSN College of Engineering, Kalavakkam-
More informationFEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS
International Journal of Computer Engineering and Applications, Volume VIII, Issue II, November 14 FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS Saju Mathew 1, Dr.
More informationNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference Architecture Version 1 March 30, 2011 2 Acknowledgements This reference architecture was developed and prepared by Dr. Fang Liu, Jin Tong, Dr. Jian Mao, Knowcean Consulting
More informationHow To Understand Cloud Computing
A STUDY OF CLOUD COMPUTING: APPLICATIONS AND CHALLENGE 1 DR. NEERAJ BHARGAVA, 2 ANCHAL KUMAWAT, 3 DR. RITU BHARGAVA, 4 SONIYA DAYMA 1 Associate Professor, Dept. of Computer Science, School of Engineering
More informationSLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Framework
International Journal of Computer Networks and Communications Security VOL. 1, NO. 3, AUGUST 2013, 95 101 Available online at: www.ijcncs.org ISSN 2308-9830 C N C S SLA Based Information Security Metric
More informationInternational Journal of Engineering Research & Management Technology
International Journal of Engineering Research & Management Technology March- 2015 Volume 2, Issue-2 Survey paper on cloud computing with load balancing policy Anant Gaur, Kush Garg Department of CSE SRM
More informationInternational Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 An Efficient Approach for Load Balancing in Cloud Environment Balasundaram Ananthakrishnan Abstract Cloud computing
More informationCLOUD COMPUTING AN EFFICIENT WAY TO PROVIDE FOR IT SERVICE IN IRAN METEOROLOGICAL ORGANIZATION
CLOUD COMPUTING AN EFFICIENT WAY TO PROVIDE FOR IT SERVICE IN IRAN METEOROLOGICAL ORGANIZATION Sedigheh Mohammadesmail and *Roghayyeh Masoumpour Amirabadi Department of Library and Information Science,
More informationXMPP A Perfect Protocol for the New Era of Volunteer Cloud Computing
International Journal of Computational Engineering Research Vol, 03 Issue, 10 XMPP A Perfect Protocol for the New Era of Volunteer Cloud Computing Kamlesh Lakhwani 1, Ruchika Saini 1 1 (Dept. of Computer
More information2. IMPLEMENTATION. International Journal of Computer Applications (0975 8887) Volume 70 No.18, May 2013
Prediction of Market Capital for Trading Firms through Data Mining Techniques Aditya Nawani Department of Computer Science, Bharati Vidyapeeth s College of Engineering, New Delhi, India Himanshu Gupta
More informationEnvironments, Services and Network Management for Green Clouds
Environments, Services and Network Management for Green Clouds Carlos Becker Westphall Networks and Management Laboratory Federal University of Santa Catarina MARCH 3RD, REUNION ISLAND IARIA GLOBENET 2012
More informationDynamic Round Robin for Load Balancing in a Cloud Computing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 6, June 2013, pg.274
More informationCHALLENGES AND ISSUES OF DEPLOYMENT ON CLOUD
CHALLENGES AND ISSUES OF DEPLOYMENT ON CLOUD S. Vimal Don Bosco 1, Dr. N Prabakaran 2 Research Scholar, Department of Computer Applications, St.Peter s University, Avadi, Chennai 600 054, India 1 Associate
More informationInternational Journal of Mechatronics, Electrical and Computer Technology
Improving Ranking Persian Subjects in Search Engine Using Fuzzy Inference System Elaheh Golzardi 1*, Majid Meghdadi 2 and Abdolbaghi Ghaderzade 1 1 Department of Computer Sciences, Research Branch, Islamic
More informationASurveyonEncryption andimprovedvirtualizationsecuritytechniquesforcloudinfrastructure
Global Journal of Computer Science and Technology: B Cloud and Distributed Volume 14 Issue 2 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationCLOUD COMPUTING AND SECURITY: VULNERABILITY ANALYSIS AND PREVENTIVE SOLUTIONS
CLOUD COMPUTING AND SECURITY: VULNERABILITY ANALYSIS AND PREVENTIVE SOLUTIONS Musa Ahmed Zayyad Department of Computer Studies, Hassan Usman Katsina Polytechnic, Katsina E-mail: zayyad19@yahoo.com +2348063440008(Nigeria)
More informationA Review On SLA And Various Approaches For Efficient Cloud Service Provider Selection Shreyas G. Patel Student of M.E, CSE Department, PIET Limda
A Review On SLA And Various Approaches For Efficient Cloud Service Provider Selection Shreyas G. Patel Student of M.E, CSE Department, PIET Limda Prof. Gordhan B. Jethava Head & Assistant Professor, Information
More informationTutorial on Client-Server Architecture
Tutorial on Client-Server Architecture SEEM3430 Information Systems Analysis and Design Pengfei Liu Department of Systems Engineering and Engineering Management The Chinese University of Hong Kong March
More informationA Secure Model for Cloud Computing Based Storage and Retrieval
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 6, Issue 1 (Sep-Oct. 2012), PP 01-05 A Secure Model for Cloud Computing Based Storage and Retrieval Yaga Reddemma
More informationA Security Integrated Data Storage Model for Cloud Environment
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,
More informationA Framework to Improve Communication and Reliability Between Cloud Consumer and Provider in the Cloud
A Framework to Improve Communication and Reliability Between Cloud Consumer and Provider in the Cloud Vivek Sridhar Rational Software Group (India Software Labs) IBM India Bangalore, India Abstract Cloud
More informationAN OVERVIEW ABOUT CLOUD COMPUTING
International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 27-30 AN OVERVIEW ABOUT CLOUD COMPUTING R. Anandhi 1, and K. Chitra 2 ABSTRACT: This paper
More informationOptimized Multi-tenancy Secure mechanism in SPI Cloud Architecture
Volume 1, No. 12, February 2013 ISSN 2278-1080 The International Journal of Computer Science & Applications (TIJCSA) RESEARCH PAPER Available Online at http://www.journalofcomputerscience.com/ Optimized
More informationCOMBINE DIFFERENT TRUST MANAGEMENT TECHNIQUE: RECOMMENDATIONAND REPUTATION IN CLOUD SERVICE. B.Brithi #1, K. Kiruthikadevi *2
COMBINE DIFFERENT TRUST : RECOMMENDATIONAND REPUTATION IN CLOUD SERVICE B.Brithi #1, K. Kiruthikadevi *2 1 P.G Scholar, Department of Computer Science and Engineering, Nandha College of Technology, Erode.
More informationSecurity Analysis of Cloud Computing: A Survey
Security Analysis of Cloud Computing: A Survey Kamaljeet Pakhre 1, Navdeep Singh 2, Sanket Mani Tiwari 3 1,2,3 Research Scholar, M. Tech. (CSE), Galgotias University, Greater Noida, India. Abstract Now
More informationKeywords Cloud Environment, Cloud Testing, Software Testing
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Software Testing
More informationRANKING OF CLOUD SERVICE PROVIDERS IN CLOUD
RANKING OF CLOUD SERVICE PROVIDERS IN CLOUD C.S. RAJARAJESWARI, M. ARAMUDHAN Research Scholar, Bharathiyar University,Coimbatore, Tamil Nadu, India. Assoc. Professor, Department of IT, PKIET, Karaikal,
More informationRANKING THE CLOUD SERVICES BASED ON QOS PARAMETERS
RANKING THE CLOUD SERVICES BASED ON QOS PARAMETERS M. Geetha 1, K. K. Kanagamathanmohan 2, Dr. C. Kumar Charlie Paul 3 Department of Computer Science, Anna University Chennai. A.S.L Paul s College of Engineering
More informationADVANCEMENT TOWARDS PRIVACY PROCEEDINGS IN CLOUD PLATFORM
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE ADVANCEMENT TOWARDS PRIVACY PROCEEDINGS IN CLOUD PLATFORM Neela Bhuvan 1, K.Ajay Kumar 2 1 M.Tech Student, Dept of CSE, Vathsalya Institute
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Broker
More informationCloud Computing. P a n a g i o t i s F o u z a s I T S o l u t i o n s M a n a g e r
C l a s s i f i c a t i o n I S O 2 7 0 0 1 : P u b l i c Cloud Computing Prospects & Challenges P a n a g i o t i s F o u z a s I T S o l u t i o n s M a n a g e r 1 OUTLINE Cloud Definition and Classification
More informationDynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
More informationCLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India
CLOUD COMPUTING 1 Er. Simar Preet Singh, 2 Er. Anshu Joshi 1 Assistant Professor, Computer Science & Engineering, DAV University, Jalandhar, Punjab, India 2 Research Scholar, Computer Science & Engineering,
More informationCloud Courses Description
Cloud Courses Description Cloud 101: Fundamental Cloud Computing and Architecture Cloud Computing Concepts and Models. Fundamental Cloud Architecture. Virtualization Basics. Cloud platforms: IaaS, PaaS,
More information