Resource Allocation for Security Services in Mobile Cloud Computing

Size: px
Start display at page:

Download "Resource Allocation for Security Services in Mobile Cloud Computing"

Transcription

1 IEEE INFOCOM 211 Workshop on M2MCN-211 Resource Allocation for Security Services in Mobile Cloud Computing Hongbin Liang 12 Dijiang Huang 3 LinX.Cai 2 Xuemin (Sherman) Shen 2 Daiyuan Peng 1 1 School of Information Science and Technology Southest Jiaotong University {dypeng}@sjtu.edu.cn 2 Department of Electrical and Computer Engineering University of Waterloo {hbliang lcai xshen}@bbcr.uaterloo.ca 3 School of Computing Informatics and Decision Systems Engineering Arizona State University {dijiang}@asu.edu Abstract Mobile cloud is a machine-to-machine service model here a mobile device can use the cloud for searching data mining and multimedia processing. To protect the processed data security services i.e. encryption decryption authentications etc. are performed in the cloud. In general e can classify cloud security services in to categories: Critical Security (CS) service and Normal Security (NS) service. CS service provides strong security protection such as using longer key size strict security access policies isolations for protecting data and so on. The CS service usually occupies more cloud computing resources hoever it generates more reards to the cloud provider since the CS service users need to pay more for using the CS service. With the increase of the number of CS and NS service users it is important to allocate the cloud resource to maximize the system reards ith the considerations of the cloud resource consumption and incomes generated from cloud users. To address this issue e propose a Security Service Admission Model (SSAM) based on Semi-Markov Decision Process to model the system reard for the cloud provider. We first define system states by a tuple represented by the numbers of cloud users and their associated security service categories and current event type (i.e. arrival or departure). We then derive the system steady-state probability and service request blocking probability by using the proposed SSAM. Numerical results sho that the obtained theoretic probabilities are consistent ith our simulation results. system vulnerability [3]. To provide enhanced security services e need to separate the resources (i.e. VIs) allocated for different security processes oned by different users. In other ords each of CS and NS service subscribers ill be allocated a unique VI or unique VIs hen he/she requests the cloud resources. I. INTRODUCTION Fig. 1. Reference Model of Mobile Cloud Computing. Mobile cloud computing relies on a machine-to-machine computing model in hich mobile devices outsource their computing tasks to the cloud [1]. In this ork our research focuses on the resource allocation for security services of mobile cloud (such as authentication digital signature audition etc.) to mobile devices. Fig. 1 shos the basic structure of mobile cloud service provisioning. In specific hen a mobile device requests a security service to the cloud the system admission control model consults the system resource management model about the availability of system resource i.e. Virtual Images (VIs) in our folloing discussion. Each VI manages a portion of cloud system resources (CPU storage etc.). If there are available VIs and the request is accepted then a VI or several VIs ill be allocated to that security service by the system resource management model. In this paper e consider that there are to types of security services as shon in Fig. 1: (i) Critical Security (CS) service and (ii) Normal Security (NS) service. In [2] the authors had pointed out that in order to provide cloud security service it is necessary to provide resource isolation among different cloud users. This is especially critical for security services since sharing resources (e.g. memory) enable attackers to explore the To construct an efficient resource allocation model for mobile cloud security services e present an admission control mechanism based on the total cloud system reard hich takes into account both the cloud income and the cost of the resource occupation. Thus the system reard is computed in the system resource management model based on the folloing factors: (i) the arriving and departing rates of CS and NS services (ii) the numbers of running CS and NS services in the system (iii) the available total system resource (measured by the numbers of VIs) (iv) the reard for CS or NS service. In general the CS service involves more complex security implementations such as stronger authentication and encryption algorithms longer key size more strict security access policies and so on. As a result the CS service usually consumes more cloud resources such as CPU time to compute the complex cryptography algorithms and occupies more hard drive spaces (i.e. strict resource isolation requires that no storage sharing is alloed). Usually users need to pay more for CS services hich means higher reard to the mobile cloud service provider. To satisfy the security service requirements of end users i.e. either CS service or NS service the mobile cloud needs to consider ho to admit mobile users service requests to obtain the maximal /11/$ IEEE 191

2 system reard ith the limited cloud resource. To address the above presented admission issue for security service requests e propose a Security Service Admission Model (SSAM) based on Semi-Markov Decision Process (SMDP) [4] to leverage the maximal system reards ith the system resource constraints. The contributions of our solutions are to-fold: We apply the Semi-Markov Decision Process to analyze the system reard of different security services and derive the optimal resource allocation policy in the mobile cloud computing. We propose SSAM to derive the cloud service blocking probability and achieve the maximum system gain of the mobile cloud by considering both system expenses and incomes (i.e. considering the system reard). The remainder of this paper is organized as follos. The related ork is presented in Section II. In Section III e present our system models. The Semi-Markov Decision Process model (SMDP) for mobile cloud computing is developed in Section IV. Based on the SMDP model e derive the blocking probability in Section V. The system performance is evaluated in Section VI folloing by concluding remarks and future ork in Section VII. II. RELATED WORK Recent research has been focused on Cloud computing for mobile devices [5] hich enables running applications beteen resource-constrained devices and Internet-based Clouds. The problem of ensuring the integrity of data storage in Cloud Computing is studied in [6] and [7]. In [8] an economic cloud computing model is presented to decide ho to manage the computing tasks ith a given configuration of the cloud system. A game theory-based resource allocation model to allocate the cloud resources according to users QoS requirements is proposed in [9]. Although resource management in ireless netorks has been extensively studied in [1] [11] and [12] existing mobile cloud solutions are limited and are solely focused on the enhancement of the individual mobile device s capability. In addition much of the previous orks for cloud security focused on the security to enhance security of Clouds themselves such as infrastructure security [13] based on TCG/TPM secure outsourcing [14] and Cloud eb security [15] etc. To the best of our knoledge none of them addressed ho to construct a system reard model for resources allocation by considering prioritized cloud security services. III. SYSTEM DESCRIPTION To improve security for cloud computing to basic security services are provided namely NS and CS services. NS service only uses basic security approaches such as authentication to validate the users and it usually involves lo-complexity computing and access control tasks. CS service provides more security services such as confidentiality digital signature access control audition anti-virus scanning etc. To simplify the notations e denote NS and CS services as l and h respectively. In our model the cloud resources are divided into K portions and each portion represents a VI. In the cloud mobile users can choose the desired security services l or h hich occupies α l VIs and α h VIs ( < α l + α h < K) respectively. With the limitation of cloud resources (i.e. VIs) it is critical to allocate the resources to maximize the system reard i.e. leverage the cloud service incomes and system running expenses. In other ords the cloud should decide hether to accept or reject a security service request (l or h) based on the currently available cloud resources and the arrival rate of potential future security service requests. The arrival rates of security services l and h follo the Poisson distribution ith mean rates l and h respectively. The cloud resource occupation time follos the exponential distribution ith mean 1/ and 1/μ h respectively. In the folloing e present the system states the actions and the reard model for the presented mobile cloud computing system. A. System States An arrival request of security service l or h can be considered as an incoming event and a departure of a service l or h can be considered as a leaving event. Thus in the system model e define three service events: 1) The cloud receives a request of security service l from a user denoted by e l ; 2) The cloud receives a request of security service h from a user denoted by e h ; and 3) The transaction of a security service completes and associated VIs are released denoted by e f. The number of security service l and security service h beingservedinthe cloud are denoted as N l and N h respectively. Therefore the system state can be expressed as: S = {s s = ŝ e } here ŝ = e {e l e h e f }and α l N l +α h N h K. B. Actions In system state ŝ upon receiving a service request (e.g. e l or e h ) to actions can be selected by the mobile cloud: accept and reject hich are denoted by a bsel /e h =1and a bsel /e h = respectively. When a departure occurs the cloud releases the cloud resources and there is no action in this case. Thus e define a bsef =. Accordingly the action set is A = {a bse a bse { 1}}. C. Reard Model Thesystemnetreardcanbeevaluatedbasedontheservice incomes and the running expenses: x(s a) τ(s a)y(s a) (1) here x(s a) is the net lump sum incomes for the cloud hen action a is chosen at the current state s y(s a) is the service holding cost rate hen the cloud is in state s and action a is selected and τ(s a) is the expected service time from the current state s to the next state hen decision a is selected. x(s a) is computed as: x(s a) = a bse = R l a bsel =1 R h a bseh =1 (2) 192

3 Fig. 2. State transition Diagram. here R l and R h are an income of the cloud hen an l and an h security service request is accepted respectively. The service holding cost rate y(s a) is proportional to the occupied cloud resources hich is given by α l N l + α h N h a bse = y(s a) = α l (N l +1)+α h N h a bsel =1 (3) α l N l + α h (N h +1) a bseh =1. IV. SMDP BASED MOBILE COMPUTING MODEL A general SMDP model consists of six elements [4]: 1) system states; 2) action sets; 3) the events; 4) decision epochs; 5) transition probabilities and 6) reards. A decision epoch is the time instant hen any of the events takes place e.g. a request of service l or h arrives or a security service is finished and the allocated resources of VIs are released. The time duration beteen to decision epoches follos an exponential distribution. Denote τ(s a) as the expected time duration beteen to decision epoches given the current state s and action a. Thus e have [γ + a bsel ] 1 e = e l τ(s a) = [γ + a bseh μ h ] 1 e = e h (4) γ 1 e = e f here γ = l + h + N l + N h μ h. The state transition in a Markov decision model is shon in Fig. 2. Denote q(j s a) as the state transition probability from state s to j hen action a is chosen. For a state s = ŝ e here ŝ = e {e l e h e f } and action a = the next state can be j 1 = e l j 2 = e h j 3 = N l 1N h e f (N 1 1 ) and j 4 = 1e f (N h 1). q(j s a) can be obtained as l τ(s a) j = j 1 q(j s a) = h τ(s a) j = j 2 (5) N l μ l τ(s a) j = j 3 N h μ h τ(s a) j = j 4 Note that α l N l + α h N h K. For the current state s = ŝ e l and the action a =1the next state can be j 5 = N l +1N h e l j 6 = N l +1N h e h j 7 = e f andj 8 = N l +1N h 1e f (N h 1). Thus q(j s a) can be obtained as: q(j s a) = l τ(s a) j = j 5 h τ(s a) j = j 6 (6) (N l +1) τ(s a) j = j 7 N h μ h τ(s a) j = j 8 Similarly for state s = ŝ e h and action a =1 the next state can be j 9 = +1e l j 1 = +1e h j 11 = N l 1N h +1e f (N l 1) and j 12 = e f. Thus q(j s a) can be obtained as q(j s a) = l τ(s a) j = j 9 h τ(s a) j = j 1 (7) N l τ(s a) j = j 11 (N h +1)μ h τ(s a) j = j 12 Applying the discounted reard model [4] the expected discounted reard during τ(n a) satisfies: { τ 1 } z(s a) = x(s a) y(s a)ebs a e αt dt { [1 e = x(s a) y(s a)ebs a ατ 1 } ] α y(s a)τ(s a) = x(s a) 1+ατ(s a) (8) 193

4 here x(s a) and y(s a) are defined in (2) and (3). The maximum long term discounted reard is given by ν(s) =max a A z(s a)+ q(j s a)ν(j) j S here = (1 + ατ(s a)) 1. Let be a finite constant = l + h +K max( μ h ) < and = /(+α). The optimality equation of ν(s) can be obtained after uniformization ν(s) =max a à z(s a)+ q(j s a) ν(j) j S here z(s a) z(s a) 1+ατ(sa) (α+)τ(sa) and q(j s a) = (9) (1) { 1 [1 q(s sa)] τ (sa) j = s q(j sa) τ(sa) j s. (11) V. BLOCKING PROBABILITY The blocking probability is an important QoS metric for a mobile cloud system. In this section e derive the blocking probability using the proposed SMDP-based SSAM. The expected total discounted reard ν(s) at state s S is dependent on l h μ h and K as shon in (1). Our objective is to find a decision rule that maximizes the total reard at each state ν(s) s. In specific hen a security service request arrives the system resource management model checks ν(s) of the current state under different actions i.e. a = or a =1 and select an action ith a higher reard. We derive the steady state probability denoted as π Nl N h e for state e in SSAM as shon in Fig. 2. We use states (j 1.. j 12 ) defined in Section IV to simplify the notation. Similarly let j 13 = 1e h (N h 1) j 14 = N l 1N h e l (N l 1). The stead state probability of π Nl N h e can be derived as follos π j1 = + j1 j2 N l =N h = β μ +a j1 j1 j7 + j1 j2 N l =N h > β μ +a j1 j1 j7 + a j 13 j13 + j1 j2 N l > N h = β μ +a j1 j1 j7 + a j 14 j14 + j1 β μ +a j1 j1 j7 +a j13 j13 + a j 14 j14 j2 N l > N h > (12) π j2 = h β μ h h β μ h h β μ h h + j2 N l =N h = j7 + j2 N l =N h > j7 + a j13 π h j13 + j2 N l > N h = j7 + a j14 π h j14 + j2 j7 β μ +a j2 π h j2 N l > N h > +a j13 π h j13 + a j14 π h j14 (13) here β = N l + N h μ h + l + h α l N l + α h N h K. As the total probability equals to 1 ehave π Nl N h e =1. (14) Solving Eq. (12-14) the steady-state probability π Nl N h e can be iteratively obtained. The blocking probability P blocking defined as the ratio of the number of rejected requests and the total number of service requests is thus given by P blocking = P P ((1 a j1 )π j1 +(1 a j2)π j2 ) P P (π j1 +π j2 ) for α l N l + α h N h K (15) here a j1 a j2 A are the actions adopted at states e l and e h respectively. VI. PERFORMANCE EVALUATION In this section e evaluate the performance of the proposed SSAM using a simulator ritten in matlab. We set up a cloud system ith the total number of VIs from 2 to 15. The request arrival rates of services l and h are 5 and 2 per unit time respectively and the average service holding time of each connection is = μ h = 6 unit times if not otherise specified. A service h occupies to VIs hile l occupies one VI hen it is accepted. Accordingly an income of.3 for l and.6 for h are added to the cloud system. We set the discount factor α =.1 to assure the convergence of the reard computation. Fig. 3. Blocking Probability (l) l =5 h =2 simu l =5 h =2 anal l =5 h =5 simu l =5 h =5 anal Blocking probability of service l under various arrival rates. The blocking probabilities of services l and h under various arrival rates of service requests are shon in Fig. 3 and Fig. 4 respectively. A loer blocking probability is achieved hen more netork resources e.g. VIs are available. Because service h requires to times cloud resources than service l 194

5 Fig. 4. Blocking Probability (h) l =5 h =2 simu l =5 h =2 anal l =5 h =5 simu l =5 h =5 anal Blocking probability of service h under various arrival rates. h is more likely to be rejected especially hen the cloud resource is limited e.g. only to VIs in the cloud. Therefore the blocking probability of service h is larger than that of service l accordingly. We further increase the arrival rate of service h from 2 to 5 per unit time. It can be seen that the blocking probability increases ith the traffic arrival rates for agiventhenetorkresource. Fig. 5. times. Fig. 6. times. Blocking Probability (l) =6 μ h =6 simu =6 μ h =6 anal =4 μ h =4 simu =4 μ h =4 anal Blocking probability of service l under various service occupation Blocking Probability (h) =6 μ h =6 simu =6 μ h =6 anal =4 μ h =4 simu =4 μ h =4 anal Blocking probability of service h under various service occupation The blocking probabilities of different services under various service departure rates are shon in Fig. 5 and Fig. 6. With a larger service holding time the system cost of each mobile user increases hich results in a degraded system reard. Therefore a ne request is more likely to be rejected. The blocking probability decreases ith the service occupation time for both services l and h. VII. CONCLUSION In this paper e have proposed a SSAM based on SMDP considering both the maximal system reard and system service expenses. The system reard is derived through SSAM by taking into considerations of the CS/NS service reards and their cloud system expenses. We derive the blocking probabilities of SSAM and conduct extensive simulations to validate our analysis. In the future e ill investigate the optimal system resources (i.e. the number of VIs) to obtain the maximal system reards under the given blocking probability. In addition e ill incorporate more system metrics into the constructions of the reard function such as different application tasks as ell. ACKNOWLEDGMENT Hongbin Liang s research is supported by the China Scholarship Council and Dijiang Huang s research is sponsored by ONR YIP aard. REFERENCES [1] D. Huang X. Zhang M. Kang and J. Luo Mobicloud: A secure mobile cloud frameork for pervasive mobile computing and communication in Proceedings of 5th IEEE International Symposium on Service-Oriented System Engineering 21. [2] H. Raj R. Nathuji A. Singh and P. England Resource management for isolation enhanced cloud services in Proceedings of ACM orkshop on Cloud computing security 29 pp [3] T. Ristenpart E. Tromer H. Shacham and S. Savage Hey You Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds in ACM Conference on Computer and Communications Security 29. [4] M. Puterman Markov decision processes: Discrete stochastic dynamic programming. John Wiley & Sons Inc. Ne York NY USA 25. [5] X. H. Li H. Zhang and Y. F. Zhang Deploying Mobile Computation in Cloud Service in Proceedings of the First International Conference for Cloud Computing (CloudCom) 29 p. 31. [6] Q. Wang C. Wang J. Li K. Ren and W. Lou Enabling public verifiability and data dynamics for storage security in cloud computing in European Symposium on Research in Computer Security (ESORICS) 29 Saint Malo France Sep 29. [7] C. Wang K. Ren W. Lou and J. Li Toards Publicly Auditably Secure Data Storage Services IEEE Netork Magazine vol. 24 no. 4 pp July/August 21. [8] H. Liang D. Huang and D. Peng On Economic Mobile Cloud Computing Model in Proceedings of the International Workshop on Mobile Computing and Clouds (MobiCloud in conjunction ith MobiCASE) 21. [9] G. Wei A. V. Vasilakos Y. Zheng and N. Xiong A game-theoretic method of fair resource allocation for cloud computing services The Journal of Supercomputing vol. 54 no. 2 pp [1] L. X. Cai L. Cai X. Shen and J. W. Mark Resource management and QoS provisioning for IPTV over mmwave-based WPANs ith directional antenna ACM Mobile Netorks and Applications (MONET) vol. 14 no. 2 pp [11] H. T. Cheng and W. Zhuang Novel packet-level resource allocation ith effective QoS provisioning for ireless mesh netorks IEEE Transactions on Wireless Communications vol. 8 no. 2 pp Feb 29. [12] L. X. Cai X. Shen and J. W. Mark Efficient MAC Protocol for Ultraideband Netorks IEEE Communications Magazine vol. 47 no. 6 pp [13] N. Santos K. Gummadi and R. Rodrigues Toards trusted cloud computing in Proceedings of USENIX HotCloud 29. [14] R. Cho P. Golle M. Jakobsson E. Shi J. Staddon R. Masuoka and J. Molina Controlling data in the cloud: outsourcing computation ithout outsourcing control in Proceedings of the 29 ACM orkshop on Cloud computing security 29 pp [15] J. Sobey T. Whalen R. Biddle P. V. Oorschot and A. Patrick Broser Interfaces and Extended Validation SSL Certificates: An Empirical Study in Proceedings of the 29 ACM orkshop on Cloud computing security

CLOUD computing is a promising platform to assist mobile

CLOUD computing is a promising platform to assist mobile 2222 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 61, NO. 5, JUNE 2012 An SMDP-Based Service Model for Interdomain Resource Allocation in Mobile Cloud Networks Hongbin Liang, Student Member, IEEE, Lin

More information

A Quantitative Approach to the Performance of Internet Telephony to E-business Sites

A Quantitative Approach to the Performance of Internet Telephony to E-business Sites A Quantitative Approach to the Performance of Internet Telephony to E-business Sites Prathiusha Chinnusamy TransSolutions Fort Worth, TX 76155, USA Natarajan Gautam Harold and Inge Marcus Department of

More information

Leveraging Multipath Routing and Traffic Grooming for an Efficient Load Balancing in Optical Networks

Leveraging Multipath Routing and Traffic Grooming for an Efficient Load Balancing in Optical Networks Leveraging ultipath Routing and Traffic Grooming for an Efficient Load Balancing in Optical Netorks Juliana de Santi, André C. Drummond* and Nelson L. S. da Fonseca University of Campinas, Brazil Email:

More information

A Robust Statistical Scheme to Monitor Transient Phenomenon in Sensor Networks

A Robust Statistical Scheme to Monitor Transient Phenomenon in Sensor Networks This full text paper as peer revieed at the direction of IEEE Communications Society subject matter experts for publication in the ICC 7 proceedings. A Robust Statistical Scheme to Monitor Transient Phenomenon

More information

CRITERIUM FOR FUNCTION DEFININING OF FINAL TIME SHARING OF THE BASIC CLARK S FLOW PRECEDENCE DIAGRAMMING (PDM) STRUCTURE

CRITERIUM FOR FUNCTION DEFININING OF FINAL TIME SHARING OF THE BASIC CLARK S FLOW PRECEDENCE DIAGRAMMING (PDM) STRUCTURE st Logistics International Conference Belgrade, Serbia 8-30 November 03 CRITERIUM FOR FUNCTION DEFININING OF FINAL TIME SHARING OF THE BASIC CLARK S FLOW PRECEDENCE DIAGRAMMING (PDM STRUCTURE Branko Davidović

More information

Review On Digital Library Application Services Of Mobile Cloud Computing

Review On Digital Library Application Services Of Mobile Cloud Computing Review On Digital Library Application Services Of Mobile Cloud Computing Dr Abdulrahman M. Al-Senaidy, Tauseef Ahmad Abstract: - In the recent years growth of computer technology contribute to the progress

More information

OPTIMIZING WEB SERVER'S DATA TRANSFER WITH HOTLINKS

OPTIMIZING WEB SERVER'S DATA TRANSFER WITH HOTLINKS OPTIMIZING WEB SERVER'S DATA TRANSFER WIT OTLINKS Evangelos Kranakis School of Computer Science, Carleton University Ottaa,ON. K1S 5B6 Canada kranakis@scs.carleton.ca Danny Krizanc Department of Mathematics,

More information

Security and Privacy issues in Cloud Computing

Security and Privacy issues in Cloud Computing Security and Privacy issues in Cloud Computing Siddharth Walia* ABSTRACT Cloud computing is a rapidly developing technology using internet and remote servers to maintain data and applications. The main

More information

Examples of adverse selection: Moral Hazard A simple job search model Unemployment Insurance. Risks of Selling a Life Annuity.

Examples of adverse selection: Moral Hazard A simple job search model Unemployment Insurance. Risks of Selling a Life Annuity. Moral Hazard, Adverse Selection and Unemployment Insurance Plan Examples of adverse selection: Risk of Selling a Life Annuity Lemons Market Moral Hazard A simple job search model Unemployment Insurance

More information

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan

More information

Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover

Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover 1 Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover Jie Xu, Member, IEEE, Yuming Jiang, Member, IEEE, and Andrew Perkis, Member, IEEE Abstract In this paper we investigate

More information

Expert Systems with Applications

Expert Systems with Applications Expert Systems ith Applications 36 (2009) 5450 5455 Contents lists available at ScienceDirect Expert Systems ith Applications journal homepage:.elsevier.com/locate/esa Trading rule discovery in the US

More information

Personalized Web Advertising Method

Personalized Web Advertising Method Personalized Web Advertising Method Przemysla Kazienko 1, Michal Adamski 1,2 1 Wrocla University of Technology, Department of Information Systems, Wybrzeze S. Wyspianskiego 27, 50-370 Wrocla, Poland kazienko@pr.roc.pl,

More information

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Beyond Limits... Volume: 2 Issue: 1 International Journal Of Advance Innovations, Thoughts & Ideas Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Shivani Koul* shivanikoul2@gmail.com

More information

School of Computer Science

School of Computer Science DDSS:Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Servers Husnu S. Narman, Md. Shohrab Hossain, Mohammed Atiquzzaman TR-OU-TNRL-13- Sep 13 Telecommunication & Network

More information

1.2 Cultural Orientation and Consumer Behavior

1.2 Cultural Orientation and Consumer Behavior JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 25, 1605-1616 (2009) A Ne Perspective for Neural Netorks: Application to a Marketing Management Problem JAESOO KIM AND HEEJUNE AHN + Department of Computer

More information

Selling T-shirts and Time Shares in the Cloud

Selling T-shirts and Time Shares in the Cloud Selling T-shirts and Time Shares in the Cloud Daniel Gmach HP Labs Palo Alto, CA, USA daniel.gmach@hp.com Jerry Rolia HP Labs Palo Alto, CA, USA jerry.rolia@hp.com Ludmila Cherkasova HP Labs Palo Alto,

More information

An Experience Based Learning Controller

An Experience Based Learning Controller J. Intelligent Learning Systems & Applications, 2010, 2: 80-85 doi:10.4236/jilsa.2010.22011 Published Online May 2010 (http://.scirp.org/journal/jilsa) An Experience Based Learning Controller Debadutt

More information

Firewall and VPN Investigation on Cloud Computing Performance

Firewall and VPN Investigation on Cloud Computing Performance Firewall and VPN Investigation on Cloud Computing Performance Siddeeq Y. Ameen 1, Shayma Wail Nourildean 2 1 Department of Computer and Information Engineering, University of Mosul, Mosul, Iraq 2 Foundation

More information

Scheduling agents using forecast call arrivals at Hydro-Québec s call centers

Scheduling agents using forecast call arrivals at Hydro-Québec s call centers Scheduling agents using forecast call arrivals at Hydro-Québec s call centers Marie Pelleau 1, Louis-Martin Rousseau 2, Pierre L Ecuyer 1, Walid Zegal 3, Louis Delorme 3 1 Université de Montréal, Montreal,

More information

Security Issues and Challenges of Mobile Cloud Computing

Security Issues and Challenges of Mobile Cloud Computing , pp.37-50 http://dx.doi.org/10.14257/ijgdc.2013.6.6.04 Security Issues and Challenges of Mobile Cloud Computing Abid Shahzad 1 and Mureed Hussain 2 Faculty of Computing, Shaheed Zulfikar Ali Bhutto Institute

More information

SOLUTION PAPER GET THERE FIRST

SOLUTION PAPER GET THERE FIRST GET THERE FIRST Keep Your Organization Out in Front Opportunities for groth are out there. Businesses need connectivity to thrive and the economic recovery is providing significant indos of groth based

More information

REDUCING RISK OF HAND-ARM VIBRATION INJURY FROM HAND-HELD POWER TOOLS INTRODUCTION

REDUCING RISK OF HAND-ARM VIBRATION INJURY FROM HAND-HELD POWER TOOLS INTRODUCTION Health and Safety Executive Information Document HSE 246/31 REDUCING RISK OF HAND-ARM VIBRATION INJURY FROM HAND-HELD POWER TOOLS INTRODUCTION 1 This document contains internal guidance hich has been made

More information

The Research on Demand Forecasting of Supply Chain Based on ICCELMAN

The Research on Demand Forecasting of Supply Chain Based on ICCELMAN 505 A publication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Editors: Peiyu Ren, Yancang Li, Huiping Song Copyright 2015, AIDIC Servizi S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The

More information

A Road Map on Security Deliverables for Mobile Cloud Application

A Road Map on Security Deliverables for Mobile Cloud Application A Road Map on Security Deliverables for Mobile Cloud Application D.Pratiba 1, Manjunath A.E 2, Dr.N.K.Srinath 3, Dr.G.Shobha 4, Dr.Siddaraja 5 Asst. Professor, Department of Computer Science and Engineering,

More information

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India

More information

How To Make A Secure Storage On A Mobile Device Secure

How To Make A Secure Storage On A Mobile Device Secure Outsourcing with secure accessibility in mobile cloud computing Monika Waghmare 1, Prof T.A.Chavan 2 Department of Information technology, Smt.Kashibai Navale College of Engineering, Pune, India. Abstract

More information

Choosing the Optimal Object-Oriented Implementation using Analytic Hierarchy Process

Choosing the Optimal Object-Oriented Implementation using Analytic Hierarchy Process hoosing the Optimal Object-Oriented Implementation using Analytic Hierarchy Process Naunong Sunanta honlameth Arpnikanondt King Mongkut s University of Technology Thonburi, naunong@sit.kmutt.ac.th King

More information

How To Maximize Admission Control On A Network

How To Maximize Admission Control On A Network Optimizing admission control while ensuring quality of service in multimedia networks via reinforcement learning* Timothy X Brown t, Hui Tong t, Satinder Singh+ t Electrical and Computer Engineering +

More information

A Markovian Sensibility Analysis for Parallel Processing Scheduling on GNU/Linux

A Markovian Sensibility Analysis for Parallel Processing Scheduling on GNU/Linux A Markovian Sensibility Analysis for Parallel Processing Scheduling on GNU/Linux Regiane Y. Kawasaki 1, Luiz Affonso Guedes 2, Diego L. Cardoso 1, Carlos R. L. Francês 1, Glaucio H. S. Carvalho 1, Solon

More information

Early Warning Indicators of Strategic Risk in Togolese Commercial Banks: An AHP Model Approach

Early Warning Indicators of Strategic Risk in Togolese Commercial Banks: An AHP Model Approach IOSR Journal of Business and Management (IOSR-JBM) e-issn: 2278-487X, p-issn: 2319-7668. Volume 16, Issue 3. Ver. IV (Feb. 2014), PP 45-61 Early Warning Indicators of Strategic Risk in Togolese Commercial

More information

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------

More information

E-mail Spam Filtering Using Genetic Algorithm: A Deeper Analysis

E-mail Spam Filtering Using Genetic Algorithm: A Deeper Analysis ISSN:0975-9646 Mandeep hodhary et al, / (IJSIT) International Journal of omputer Science and Information Technologies, Vol. 6 (5), 205, 4266-4270 E-mail Spam Filtering Using Genetic Algorithm: A Deeper

More information

XXX. Problem Management Process Guide. Process Re-engineering Problem Management Process

XXX. Problem Management Process Guide. Process Re-engineering Problem Management Process XXX Management Process Guide Process Re-engineering Management Process Version Control Document Version Status Date Author Name Signature Date Table of Contents 1. INTRODUCTION...1 2. PURPOSE OF THE DOCUMENT...

More information

Optimal Sequential Paging in Cellular Networks

Optimal Sequential Paging in Cellular Networks Optimal Sequential Paging in Cellular Netorks Bhaskar Krishnamachari, Rung-Hung Gau, Stephen B. Wicker, Zygmunt J. Haas School of Electrical and Computer Engineering, Cornell University, Ithaca, NY 14853

More information

Network Traffic Prediction Based on the Wavelet Analysis and Hopfield Neural Network

Network Traffic Prediction Based on the Wavelet Analysis and Hopfield Neural Network Netork Traffic Prediction Based on the Wavelet Analysis and Hopfield Neural Netork Sun Guang Abstract Build a mathematical model is the key problem of netork traffic prediction. Traditional single netork

More information

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A Review of Anomaly Detection Techniques in Network Intrusion Detection System A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In

More information

DDSS: Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Computing

DDSS: Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Computing DDSS: Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Computing Husnu S. Narman husnu@ou.edu Md. Shohrab Hossain mshohrabhossain@cse.buet.ac.bd Mohammed Atiquzzaman atiq@ou.edu

More information

On the Interaction and Competition among Internet Service Providers

On the Interaction and Competition among Internet Service Providers On the Interaction and Competition among Internet Service Providers Sam C.M. Lee John C.S. Lui + Abstract The current Internet architecture comprises of different privately owned Internet service providers

More information

Securing MANET Using Diffie Hellman Digital Signature Scheme

Securing MANET Using Diffie Hellman Digital Signature Scheme Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2

More information

A Survey of Software Architecture Viewpoint Models

A Survey of Software Architecture Viewpoint Models A Survey of Softare Architecture Viepoint Models Nicholas May nick may@netlink.com.au Abstract The documentation of softare architecture is carried out in many different ays. One method is to break up

More information

CLINICAL NEGLIGENCE IN THE NHS IN WALES. Report by the National Audit Office on behalf of the Auditor General for Wales

CLINICAL NEGLIGENCE IN THE NHS IN WALES. Report by the National Audit Office on behalf of the Auditor General for Wales CLINICAL NEGLIGENCE IN THE NHS IN WALES Report by the National Audit Office on behalf of the Auditor General for Wales CLINICAL NEGLIGENCE IN THE NHS IN WALES Report by the Auditor General for Wales, presented

More information

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) PERCEIVING AND RECOVERING DEGRADED DATA ON SECURE CLOUD

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) PERCEIVING AND RECOVERING DEGRADED DATA ON SECURE CLOUD INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

Executive Stock Options with Effort Disutility and Choice of Volatility

Executive Stock Options with Effort Disutility and Choice of Volatility Executive Stock Options ith Effort Disutility and Choice of Volatility Abel Cadenillas Jakša Cvitanić Fernando Zapatero This draft: February 2, 22 JEL classification: C6, G39 The research of A. Cadenillas

More information

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India

More information

Mind the Duality Gap: Logarithmic regret algorithms for online optimization

Mind the Duality Gap: Logarithmic regret algorithms for online optimization Mind the Duality Gap: Logarithmic regret algorithms for online optimization Sham M. Kakade Toyota Technological Institute at Chicago sham@tti-c.org Shai Shalev-Shartz Toyota Technological Institute at

More information

Multi Tenancy Access Control Using Cloud Service in MVC

Multi Tenancy Access Control Using Cloud Service in MVC Multi Tenancy Access Control Using Cloud Service in MVC 1 Sonia Gupta, 2 Rubal Choudary Indo Global College of Engg, Abhipur, Mohali Abstract - Cloud Computing is the next generation Internet service and

More information

Modelling Quality of Service in IEEE 802.16 Networks

Modelling Quality of Service in IEEE 802.16 Networks 1 Modelling Quality of Service in IEEE 802.16 Networks Giuseppe Iazeolla1, Pieter Kritzinger2 and Paolo Pileggi2 1 Software Engineering and System Performance Modelling Group University of Roma Tor Vergata,

More information

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information

A Secured Cost-effective Multi-Cloud Storage in Cloud Computing

A Secured Cost-effective Multi-Cloud Storage in Cloud Computing IEEE INFOCOM 2011 Workshop on Cloud Computing A Secured Cost-effective Multi-Cloud Storage in Cloud Computing Yashaswi Singh, Farah Kandah, Weiyi Zhang Department of Computer Science, North Dakota State

More information

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption. Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune ghatkar.abhaya@gmail.com, jadhavreena70@yahoo.com, renjug03@gmail.com,

More information

Reducing Surgical Ward Congestion through. Improved Surgical Scheduling and Uncapacitated Simulation

Reducing Surgical Ward Congestion through. Improved Surgical Scheduling and Uncapacitated Simulation Reducing Surgical Ward Congestion through Improved Surgical Scheduling and Uncapacitated Simulation Vincent S. Cho 1, Martin L. Puterman 2, Neda Salehirad 3, Wenhai Huang 1, Derek Atkins 3 1. British Columbia

More information

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.

More information

Topic 4: Introduction to Labour Market, Aggregate Supply and AD-AS model

Topic 4: Introduction to Labour Market, Aggregate Supply and AD-AS model Topic 4: Introduction to Labour Market, Aggregate Supply and AD-AS model 1. In order to model the labour market at a microeconomic level, e simplify greatly by assuming that all jobs are the same in terms

More information

RESEARCH PRODUCTIVITY OF DEGREE COLLEGE TEACHERS IN GOA UNIVERSITY: A STUDY

RESEARCH PRODUCTIVITY OF DEGREE COLLEGE TEACHERS IN GOA UNIVERSITY: A STUDY ISSN:2201142 (Online), ISSN 2349302X (Print) ooll.. 44,, JJuullyy SSeepptt.. 22001144,, IIssssuuee 33 RESEARCH PRODUCTIITY OF DEGREE COLLEGE TEACHERS IN GOA UNIERSITY: A STUDY Dr. Jayaprakash Librarian,

More information

Tasks Scheduling Game Algorithm Based on Cost Optimization in Cloud Computing

Tasks Scheduling Game Algorithm Based on Cost Optimization in Cloud Computing Journal of Computational Information Systems 11: 16 (2015) 6037 6045 Available at http://www.jofcis.com Tasks Scheduling Game Algorithm Based on Cost Optimization in Cloud Computing Renfeng LIU 1, Lijun

More information

wwwww BASW Continuing Professional Development (CPD) Policy

wwwww BASW Continuing Professional Development (CPD) Policy BASW Continuing Professional Development (CPD) Policy 1 Supervision Date: February 2012 Author: The Policy, Ethics and Human Rights Committee Contact: Fran McDonnell, Policy Team Email: policy@bas.co.uk

More information

A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor

A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor I J C International Journal of lectrical, lectronics ISSN No. (Online): 2277-2626 and Computer ngineering 3(2): 144-148(2014) A Review of Cloud nvironment and Recognition of Highly Secure Public Data Verification

More information

Content Distribution Scheme for Efficient and Interactive Video Streaming Using Cloud

Content Distribution Scheme for Efficient and Interactive Video Streaming Using Cloud Content Distribution Scheme for Efficient and Interactive Video Streaming Using Cloud Pramod Kumar H N Post-Graduate Student (CSE), P.E.S College of Engineering, Mandya, India Abstract: Now days, more

More information

MobiCloud: Building Secure Cloud Framework for Mobile Computing And. Communication

MobiCloud: Building Secure Cloud Framework for Mobile Computing And. Communication 2010 Fifth IEEE International Symposium on Service Oriented System Engineering MobiCloud: Building Secure Cloud Framework for Mobile Computing And Communication Dijiang Huang Computer Science Engineering,

More information

ROLE OF METADATA IN DIGITAL RESOURCE MANAGEMENT

ROLE OF METADATA IN DIGITAL RESOURCE MANAGEMENT ooll.. 44,, JJuullyy SSeepptt.. 22001144,, IIssssuuee -- 33 ROLE OF METADATA IN DIGITAL RESOURCE MANAGEMENT Dr. arshil Bhagaji Dashrath Librarian College of Agriculture, Baramati. Email: varshilpb@gmail.com

More information

Effective Bandwidth of Multiclass Markovian Traffic Sources and Admission Control With Dynamic Buffer Partitioning

Effective Bandwidth of Multiclass Markovian Traffic Sources and Admission Control With Dynamic Buffer Partitioning 1524 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 51, NO. 9, SEPTEMBER 2003 Effective Bandwidth of Multiclass Markovian Traffic Sources and Admission Control With Dynamic Buffer Partitioning Yu Cheng, Student

More information

Performance Modeling and Analysis of a Database Server with Write-Heavy Workload

Performance Modeling and Analysis of a Database Server with Write-Heavy Workload Performance Modeling and Analysis of a Database Server with Write-Heavy Workload Manfred Dellkrantz, Maria Kihl 2, and Anders Robertsson Department of Automatic Control, Lund University 2 Department of

More information

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering

More information

Improving Cloud Survivability through Dependency based Virtual Machine Placement

Improving Cloud Survivability through Dependency based Virtual Machine Placement Improving Cloud Survivability through Dependency based Virtual Machine Placement Min Li, Yulong Zhang, Kun Bai 2, Wanyu Zang, Meng Yu, and Xubin He 3 Computer Science, Virginia Commonwealth University,

More information

Privacy Preserving Distributed Cloud Storage

Privacy Preserving Distributed Cloud Storage Privacy Preserving Distributed Cloud Storage Praveenkumar Khethavath 1 *, Doyel Pal 2 1 Department of Mathematics, Engineering and Computer Science, LaGuardia Community College, Long Island City, NY 11101.

More information

arxiv:1312.0333v1 [cs.ni] 2 Dec 2013

arxiv:1312.0333v1 [cs.ni] 2 Dec 2013 1 State Transition Analysis of Time-Frequency Resource Conversion-based Call Admission Control for LTE-Type Cellular Network Hangguan Shan, Zhifeng Ni, Weihua Zhuang, Aiping Huang, and Wei Wang Department

More information

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,

More information

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing

More information

How To Ensure Correctness Of Data In The Cloud

How To Ensure Correctness Of Data In The Cloud A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, priya25mehta@gmail.com 2 M. Tech.

More information

An Optimization Model of Load Balancing in P2P SIP Architecture

An Optimization Model of Load Balancing in P2P SIP Architecture An Optimization Model of Load Balancing in P2P SIP Architecture 1 Kai Shuang, 2 Liying Chen *1, First Author, Corresponding Author Beijing University of Posts and Telecommunications, shuangk@bupt.edu.cn

More information

The Probabilistic Model of Cloud Computing

The Probabilistic Model of Cloud Computing A probabilistic multi-tenant model for virtual machine mapping in cloud systems Zhuoyao Wang, Majeed M. Hayat, Nasir Ghani, and Khaled B. Shaban Department of Electrical and Computer Engineering, University

More information

Dual Strategy based Negotiation for Cloud Service During Service Level Agreement

Dual Strategy based Negotiation for Cloud Service During Service Level Agreement Dual Strategy based for Cloud During Level Agreement Lissy A Department of Information Technology Maharashtra Institute of Technology Pune, India lissyask@gmail.com Debajyoti Mukhopadhyay Department of

More information

A Genetic Algorithm Approach for Solving a Flexible Job Shop Scheduling Problem

A Genetic Algorithm Approach for Solving a Flexible Job Shop Scheduling Problem A Genetic Algorithm Approach for Solving a Flexible Job Shop Scheduling Problem Sayedmohammadreza Vaghefinezhad 1, Kuan Yew Wong 2 1 Department of Manufacturing & Industrial Engineering, Faculty of Mechanical

More information

Shareability and Locality Aware Scheduling Algorithm in Hadoop for Mobile Cloud Computing

Shareability and Locality Aware Scheduling Algorithm in Hadoop for Mobile Cloud Computing Shareability and Locality Aware Scheduling Algorithm in Hadoop for Mobile Cloud Computing Hsin-Wen Wei 1,2, Che-Wei Hsu 2, Tin-Yu Wu 3, Wei-Tsong Lee 1 1 Department of Electrical Engineering, Tamkang University

More information

Enabling Public Auditing for Secured Data Storage in Cloud Computing

Enabling Public Auditing for Secured Data Storage in Cloud Computing IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 5 (May. 2013), V3 PP 01-05 Enabling Public Auditing for Secured Data Storage in Cloud Computing 1 Er.Amandeep Kaur,

More information

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving, Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party

More information

ASSURING INTEGRITY OF DATAFLOW PROCESSING IN CLOUD COMPUTING INFRASTRUCTURE

ASSURING INTEGRITY OF DATAFLOW PROCESSING IN CLOUD COMPUTING INFRASTRUCTURE ASSURING INTEGRITY OF DATAFLOW PROCESSING IN CLOUD COMPUTING INFRASTRUCTURE R.Genga devi 1, K.Anitha 2, M.Murugeshwari 3,S.vidhya 4, Dr.K.Ramasamy 5 1, 2, 3- UG STUDENT, P.S.R.RENGASAMY COLLEGE OF ENGINEERING

More information

A Study on the Security of RFID with Enhancing Privacy Protection

A Study on the Security of RFID with Enhancing Privacy Protection A Study on the Security of RFID with Enhancing Privacy Protection *Henry Ker-Chang Chang, *Li-Chih Yen and *Wen-Chi Huang *Professor and *Graduate Students Graduate Institute of Information Management

More information

Voice Service Support over Cognitive Radio Networks

Voice Service Support over Cognitive Radio Networks Voice Service Support over Cognitive Radio Networks Ping Wang, Dusit Niyato, and Hai Jiang Centre For Multimedia And Network Technology (CeMNeT), School of Computer Engineering, Nanyang Technological University,

More information

Distributed Attribute Based Encryption for Patient Health Record Security under Clouds

Distributed Attribute Based Encryption for Patient Health Record Security under Clouds Distributed Attribute Based Encryption for Patient Health Record Security under Clouds SHILPA ELSA ABRAHAM II ME (CSE) Nandha Engineering College Erode Abstract-Patient Health Records (PHR) is maintained

More information

A Hybrid Malicious Code Detection Method based on Deep Learning

A Hybrid Malicious Code Detection Method based on Deep Learning , pp. 205-26 http://dx.doi.org/0.4257/isia.205.9.5.2 A Hybrid Malicious Code Detection Method based on Deep Learning Yuancheng Li, Rong Ma and Runhai Jiao School of Control and Computer Engineering, North

More information

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,

More information

Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication

Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication RESEARCH ARTICLE OPEN ACCESS Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication Siva Ramakrishnan S( M.Tech ) 1,Vinoth Kumar P (M.E) 2 1 ( Department Of Computer Science Engineering,

More information

Building a High-Quality Teaching Profession

Building a High-Quality Teaching Profession Building a High-Quality Teaching Profession Lessons from around the orld Background Report for the International Summit on the Teaching Profession Building a High-Quality Teaching Profession Lessons from

More information

REGIONAL BLACKOUTS: PROTECTION OF BROADCAST CONTENT ON 3G NETWORKS

REGIONAL BLACKOUTS: PROTECTION OF BROADCAST CONTENT ON 3G NETWORKS REGIONAL BLACKOUTS: PROTECTION OF BROADCAST CONTENT ON 3G NETWORKS Alexander W. Dent, Allan Tomlinson Mobile VCE Research Group, Information Security Group, Royal Holloway, University of London, Egham,

More information

Channel assignment for GSM half-rate and full-rate traffic

Channel assignment for GSM half-rate and full-rate traffic Computer Communications 23 (2000) 476 482 www.elsevier.com/locate/comcom Channel assignment for GSM half-rate and full-rate traffic P. Lin, Y.-B. Lin* Department of Computer Science and Information Engineering,

More information

Security Considerations for Public Mobile Cloud Computing

Security Considerations for Public Mobile Cloud Computing Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of

More information

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou 3rd International Conference on Science and Social Research (ICSSR 2014) Exploration on Security System Structure of Smart Campus Based on Cloud Computing Wei Zhou Information Center, Shanghai University

More information

Prediction of Stock Performance Using Analytical Techniques

Prediction of Stock Performance Using Analytical Techniques 136 JOURNAL OF EMERGING TECHNOLOGIES IN WEB INTELLIGENCE, VOL. 5, NO. 2, MAY 2013 Prediction of Stock Performance Using Analytical Techniques Carol Hargreaves Institute of Systems Science National University

More information

Near Sheltered and Loyal storage Space Navigating in Cloud

Near Sheltered and Loyal storage Space Navigating in Cloud IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata

More information

DeuceScan: Deuce-Based Fast Handoff Scheme in IEEE 802.11 Wireless Networks

DeuceScan: Deuce-Based Fast Handoff Scheme in IEEE 802.11 Wireless Networks : Deuce-Based Fast Handoff Scheme in IEEE 82.11 Wireless Networks Yuh-Shyan Chen, Chung-Kai Chen, and Ming-Chin Chuang Department of Computer Science and Information Engineering National Chung Cheng University,

More information

IEEE 2015-2016 JAVA TITLES

IEEE 2015-2016 JAVA TITLES ECWAY ECHNOLGIES IEEE 2015-2016 JAVA TITLES BE, B.TECH, ME, M.TECH, MSC, MCA PROJECTS Abstract: Introduction: Literature Survey: System Analysis: Existing System: Disadvantages: Proposed System: Advantages:

More information

A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing

A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing Liang-Teh Lee, Kang-Yuan Liu, Hui-Yang Huang and Chia-Ying Tseng Department of Computer Science and Engineering,

More information

Characterization and Modeling of Packet Loss of a VoIP Communication

Characterization and Modeling of Packet Loss of a VoIP Communication Characterization and Modeling of Packet Loss of a VoIP Communication L. Estrada, D. Torres, H. Toral Abstract In this work, a characterization and modeling of packet loss of a Voice over Internet Protocol

More information

Public Auditing for Shared Data in the Cloud by Using AES

Public Auditing for Shared Data in the Cloud by Using AES Public Auditing for Shared Data in the Cloud by Using AES 1 Syagamreddy Subbareddy, 2 P.Tejaswi, 3 D.Krishna 1 M.Tech(CSE) Pursuing, 2 Associate Professor, 3 Associate Professor,HOD, 1,2,3 Dept. of Computer

More information

Load Balancing Algorithm Based on Services

Load Balancing Algorithm Based on Services Journal of Information & Computational Science 10:11 (2013) 3305 3312 July 20, 2013 Available at http://www.joics.com Load Balancing Algorithm Based on Services Yufang Zhang a, Qinlei Wei a,, Ying Zhao

More information

PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM

PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM Akmal Basha 1 Krishna Sagar 2 1 PG Student,Department of Computer Science and Engineering, Madanapalle Institute of Technology & Science, India. 2 Associate

More information

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN

More information