IOSR Journal of Computer Engineering (IOSR-JCE)

National Conference on Recent Trends in Computer Science and Information Technology

Volume 10

Paper Type : Research Paper
Title : Cloud Computing Threats & Their Impact
Country : India
Authors : Sabah Naseem || Prof. A B Sasankar

Abstract: We know that now a days the cloud computing is growing more fastly. It is aadvance technology. Where data, hardware & software are shared over a network on use & pay rule. Because of this many organization are moving towards the cloud. There is no. of threats which cause possible harm or used to exploit important data. A threat can be either intentional or accidental. In this paper we will discuss about the threat & security issues. What are the different type of threats & their impact.

Keywords -cloud computing , cloud computing service model, threats.

[1]. MervatAdibBamiah* et al. / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 9, Issue No. 1, 087 – 090
[2]. Che Wan AmiruddinChek Wan Samsudin,Data Provenance for e-Social Science Cloud Applications
[3]. Albert Folch, Interface development for Eucalyptus based cloud
[4]. http://searchcloudcomputing.techtarget.com/definition/hybrid-cloud
[5]. http://talkcloudcomputing.com/wp-content/uploads/2012/10/Cloud-Computing-2-Web-1.jpg


Paper Type : Research Paper
Title : Cloud Computing Security Disputes, Defies and Elucidations
Country : India
Authors : Venugopal S. Narsingoju || Dr. S. B. Kishor

Abstract: Cloud computing is an up going technology now a days where shared resources, software's and information are provided to computers and devices. Security in respect to cloud computing is an important and critical aspect, and has numerous issues and problem related to it. Since cloud computing uses distributed resources in open environment, thus it is important to provide the security and trust to share the data for developing cloud computing applications......
Keywords: Cloud Computing, Risk Utility Commuting, Virtual Machine Layer

[1]. Buyya R, Chee Shin Y, Venugopal S, Broberg J, Brandic I. Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems; 2009; 25(6):599–616.
[2]. Armbrust M, Fox A, Griffith R, Joseph A D, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M. A View of Cloud Computing. Communications of the ACM ; 2010; 53(4):50–58.
[3]. Subashini S, Kavitha V. A survey on security issues in service delivery models of cloud computing. Journal of Network and mputer Applications; 2011; 4(1):1–11.
[4]. Takabi H, Joshi J B D, Ahn G. Security a nd privacy challenges in cloud computing environments. IEEE Security & Privacy;2010;8(6) :24–31.
[5]. Sangroya A, Kumar S, Dhok J, Varma V. Towards analyzing data security risks in cloud computing environments. Communications in Computer and Information Science; 2010; 54 :255–265.

Paper Type : Research Paper
Title : WEB PERSONALIZATION BASED ON ROCK ALGORITHM
Country : India
Authors : Ms. Bhagyashree Ambulkar || Ms. Rajeshree Ambulkar || Mr. Praful Barekar

Abstract: With the demand of different information by different users from same web page becomes critical problem for web personalization. The motive of clustering analysis is to discover rich quality of clusters such that the similarity between the intra-cluster is high. By usingpersonalization,access to the web pages or the contents of a Web page are modified to better fit the needs of the user.....

Keywords: web usage mining, web personalization, hierarchical agglomerative algorithm.

[1] Sudipto Guha , Rajeev Rastogi , Kyuseok Shim "ROCK: A Robust Clustering Algorithm for Categorical Attributes".
[2] Amit Rustagi "A Near Real-Time Personalization for eCommerce".
[3] http://dev.day.com/docs/en/cq/5-5/administering/ personalization.html
[4] Dimitrios Pierrakos, Georgios paliouras, Christos Papatheodorou and Constantine D. Spyropoulos "Web Usage Mining as a Tool for Personalization: A Survey" User Modeling and User-Adapted Interaction 13: 311-372,2 003.
[5] Lu Mei, Zhao Xiang-Jun "A Novel PSO k-Modes Algorithm for Clustering Categorical Data".


Paper Type : Research Paper
Title : Interference issues of WLAN 802.11b with Other Devices in ISM 2.4 Ghz Band.
Country : India
Authors : Anupam chaube

Abstract: The paper presented deals with the issues of interference in ISM 2.4 Ghz band when WLAN 802.11b operating with other devices specially cordless phone and BT operated WPAN. From observation it is clear that WLAN 802.11b receive severe interference from both these devices because their power level coincide with each other, we have also observe that interference caused by BT will be more severe when it is in close proximity of WLAN. The interference issue becomes more serious when WLAN and WPAN are implemented on a single chip designed to share some radio components......

........

[1]. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE std 802.11, 1999.
[2]. Bluetooth Revealed – Brent A. Miller,Chatschik Bisdikian. Pearson Education.
[3]. B. P. Crow, I.Widjaja, J. G. Kim, and P. T. Sakai, ―IEEE 802.11 wireless local area networks,‖ IEEE Commun. Mag., vol. 35, pp.
116–126, Sept. 1997.
[4]. Bluetooth Core Specification [Online]. Available: http://www.bluetooth. Com
[5]. WiFi (802.11b) and Bluetooth: An Examination of Coexistence Approaches (2001, Mar.). [Online].
Available:http://www.mobilian.com/ whitepaper_frame.htm


Paper Type : Research Paper
Title : VARIOUS SECURITY ISSUES IN CLIENT SIDE CLOUD COMPUTING
Country : India
Authors : Ms. Punam R. Naphade || Dr. Girish Katkar

Abstract: Cloud Computing (CC) is an emerging computing paradigm that provides large amount of computing and storage to the Clients provisioned as a service over the internet in a pay-as you-go pricing model, where the Clients pay only according to the usage of their services. In Cloud Computing, the feature of multi-tenancy gives privacy, security, access control, authentication, authorization challenges, because of sharing of physical resources among un-trusted tenants so, a suitable technique with proper management should be applied before outsourcing the data and updating of data........

Keywords:- IaaS, PaaS, Saas, Vulnerability, Sustainable, OAuth, SAML etc.

[1]. Wolf Halton, "Security Solutions for Cloud Computing" July 15, 2010.
[2]. Henry J. Sienkiewicz, "Cloud Computing: A perspective" Defense Information Systems Agency - April 2009.
[3]. Privacy in the Cloud Computing Era: A Microsoft Perspective - November 2009.
[4]. Bharat Bhargava, Anya Kim, YounSun Cho, "Research in Cloud Security and Privacy" .
[5]. Ponemon Institute and CA "Security of cloud computing Users: A study of Practitioners in the US & Europe". May 12, 2010.


Paper Type : Research Paper
Title : Resolving the Optimization Problems Of Multi Communication Gateway for Remote Embedded Web Server using PSO
Country : India
Authors : Prof. Nitin S. Raulwar || Dr. Pradeep B. Dahikar

Abstract: Wireless sensor networks (WSNs) are networks of autonomous nodes used for monitoring an environment. Developers of WSNs face challenges that arise from communication link failures, memory and computational constraints, and limited energy. Many issues in WSNs are formulated as multidimensional optimization problems, and approached through bio-inspired techniques. Particle swarm optimization (PSO) is a simple, effective and computationally efficient optimization algorithm.........

Keywords: clustering, data-aggregation , embedded web server, , RSA, Optimal coverage problem, PSO, Wireless sensor networks.

[1]. D. Raskovic Electr. & Comput. Eng. Dept., Univ. of Alaska Fairbanks, Fairbanks, AK V. Revuri ; D. Giessel ; A. Milenkovic Embedded web server for wireless sensor networks System Theory, 2009. SSST 2009. 41st Southeastern Symposium on
[2]. Satyobroto Talukder, ―Mathematical Modelling and Applications of Particle Swarm Optimization‖, Feb 2011.
[3]. R.Karthi, S.Arumugam, and K. Rameshkumar. (2008, Jan.). Comparative evaluation of Particle Swarm Optimization Algorithms for Data Clustering using real world data sets. IJCSNS International Journal of Computer Science and Network Security.[Online].8(1).pp. 203-212.
[4]. Jianchao Fan,, Jun Wang, and Min Han, ―Cooperative Coevolution for Large-scale Optimization Based on Kernel Fuzzy Clustering and Variable Trust Region Methods,‖. IEEE Transactions on TFS., to be published.
[5]. Qinghai Bai, ―Analysis of Particle Swarm Optimization Algorithm‖, Computer and Information Science, www.ccsenet.org/cis,Vol. 3, No. 1, February 2010, pp. 1-5.


Paper Type : Research Paper
Title : A Roadmap towards Cloud Migration
Country : India
Authors : Mr. Ashish D. Musale || Dr. Pradeep G. Khot

Abstract: Most organizations still run a large majority of their IT applications, services and workloads within their own on premises data centers. This gives significant scope to realize potential operational and efficiency improvements achievable by cloud migrating some or more of those processes into external, off-premises managed hosting or cloud service environments.........

Keywords: Application, cloud computing, cloud migration, clo ud types, Service providers

[1]. Boutaba, Qi Zhang · Lu Cheng · Raouf. "Cloud computing: state-of-the-art and research challenges." J Internet Serv Appl (2010) (April 2010).
[2]. kailashjayaswal, jagannathkallakurchi, donald j. Houde, dr. Deven shah, kogent learning solutions,. cloud computing black book,dream tech press. n.d.
[3]. michaeldaconta,"the great cloud migration: your roadmap to cloud computing, big data and linked data. n.d.
[4]. Varia, Jinesh. "Migrating your Existing Applications to the AWS Cloud." October 2010.
[5]. http://cloudtweaks.com/2013/10/plan-ahead-for-a-successful-cloud-migration/
[6]. http://tier3technology.com/cloud-migration.php


Paper Type : Research Paper
Title : Study Of Energy And Time Optimization Using Green Computing In Cloud Environment
Country : India
Authors : Shubhangi Gadhwe

Abstract: Cloud computing is widely used in business and IT companies. It allows to host the application from consumers, scientists and various domains on payments basis. However data centres hosting cloud computing applications consume huge amounts of energy, contributing to high operational costs and evolution of carbon to the environment. The data centres or clouds have high capacity of data storage and processing. As per the features provided it requires huge amount of power supply and resources..........

Keywords: Cloud Computing, Green Computing, Virtualization, Energy Efficiency, Resource Management

[1]. "Application of Green Cloud Computing for Efficient Resource Energy Management in Data Centres" Yuvapriya Ponnusamy et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (5) , 2012,5101 – 5107
[2]. http://www.jetir.org/papers/JETIR1504053.pdf
[3]. "A Survey on Green Computing Techniques" , (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (5) , 2014, 6248-6252
[4]. B. Priya, E. S. Pilli and R. C. Joshi, (Eds.), "A Survey on Energy and Power Consumption Models for Greener Cloud", roceeding of the IEEE 3rd International Advance Computing Conference (IACC), (2013), February 22-23; Ghaziabad
[5]. S. Sharma, C.-H. Hsu, and W. chun Feng, "Making a case for a green500 list." in IEEE International Parallel and Distributed Processing Symposium (IPDPS 2006)/ Workshop on High Performance - Power Aware Computing, 2006.


Paper Type : Research Paper
Title : A Review On Security Approach In Big Data
Country : India
Authors : Ms. Chetana Girish Gorakh || Dr. Kishor M. Dhole

Abstract: Today we are living in the digital world, so everyday substantial amount of data generated and it is very tedious job to manage, acquire, access, deploy and store large scale of data. Traditional databases are not compatible to manage, store and analyze heterogeneous data generated every day. Hence it needs to study concepts which identify newest techniques, methods to provide high security of data configuration and extraction in big data environment..........

Keywords: Big data, map reduce, Hadoop, security and privacy, big data analytics.

[1]. Sangita Bansal , Dr. Ajay Rana , Department of Computer Science and engineering Amity university , Noida ( U. P.) India , transitioning From relational databases to big data , International journal of advanced research in computer science and software engineering valume 4 , Issue 1, January 2014
[2]. Punit singh Duggal and sanchita paul , Department of computer science and engineering , Birla institute of technology ,mesra , Ranchi ,India , Big data analysis : Challenge and solution ,International conference on cloud , big data and trust 2013 , nov 13-15 ,RGPV.
[3]. Raghav Toshniwal , kanishka Ghosh Dastidar ,Ashok Nath ,department of computer science ,st. xaviers college (autonomous) kollata,india , Big Data Security issue and challenge, International Journal of Innovative in Advanced Engineering (IJIRAE) ISSN:2349-2163 ISSUE 2, Volume 2 (February2015).



IOSR Journals are published both in online and print versions.