E-commerce and M-commerce a comparison
Review Paper | Journal Paper
Vol.06 , Issue.02 , pp.444-445, Mar-2018
Abstract
The object of the paper is to investigate the comparison between e- commerce and m- commerce. The e- commerce is an oldest method of online trading for the consumers. The m- commerce is a newly developed trend in online trading for the E-commerce is defined as according to Steven Coleman “it is the process by which business and consumer buy and sell goods and services through an A study on impact of E-COMMERCE on Indian economy, It is projected to cross $100 billion within next five years. This will contribute more than 4% to India’s GDP. E-COMMERCE provides the useful resource for the growth of MSME’S and all aspects of the rural community. The e-commerce contributes more GDP for the Indian economy. The m-commerce is known as mobile commerce. This is a newly developed online trading method between consumers. “THE DELIVERY OF ELECTRONIC COMMERCE CAPABILITIES DIRECTLY INTO THE CONSUMERS HAND ANYWHERE VIA WIRELESS TECHNOLOGY”. The GDP contribution of mobile is nearly to E-COMMERCE in all aspects. The m-commerce facilities attract consumers in all aspects. The trading can be done through M-COMMERCE from anywhere. They provide a different transaction facility for their consumers. The m-commerce has the source of overcome e-commerce in recent days. The m-commerce can be easily accessed by each and every consumer. Since the transaction options are liberal the consumers are attracted towards m-commerce. The discount facilities options are indicated in m-commerce so the consumer often checks through m-commerce than e-commerce.
Key-Words / Index Term
M Commerce, E- Commerce
References
[1]. https://en.wikipedia.org/wiki/E-commerce
[2]. http://searchmobilecomputing.techtarget.com/definition/m-commerce
Citation
J. Chandra Sekhar, A.M. Muhamed Ibrahim, "E-commerce and M-commerce a comparison", International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.444-445, 2018.
A Study on Consumer Preference towards Online Shopping with Special Reference to Working Women in Tiruchirappalli City
Review Paper | Journal Paper
Vol.06 , Issue.02 , pp.446-451, Mar-2018
Abstract
Marketing basically helps the consumer’s needs more effectively and efficiently with good product and services with best price and delivery. A good marketer continuously strives to satisfy consumer’s needs in better way. Sometimes opportunity to give the consumers in better way is designed by marketers himself and sometimes it is offered by the technology. Internet is changing the way consumers shop for goods and services and has rapidly evolved into a global event. Online shopping or e-shopping is a form of electronic commerce which allows consumers to directly buy goods or services form a seller over the Internet using a web browser.
Key-Words / Index Term
Goods and Services, Price, Marketing, Technology, Brand
References
[1]. Ward Hanson, Kirthi Kalyanam, Internet Marketing, Edition-1th, Cangage Learning India Pvt Ltd,New Delhi, 2008.
[2]. Parag diwan, L.N. Aggarwal, Marketing management, Edition 4th, Excel Books publication, New Delhi, 2006.
[3]. Dan Zarrella, Social Media Marketing Book, Edition 1th, O’Reilly Publication, 2009.
[4]. philip kotler, marketing management: A South Asian Perspective, edition 14th, pearson publication, 2012.
[5]. R.S.N Pillai and Bhagavathi,, Marketing management, chand and co ltd publication, Edition 5th 2010.
[6]. Jennifer Rowley, “Product search in e-shopping: a review and research propositions”, Journal of Consumer Marketing, Vol. 17, iss: 1, 2000, pp. 20-35.
[7]. Ahasanul Haque and Ali Khatibi, “E Shopping Current Practices and future opportunities”, Journal of Social Sciences, Vol. 1, iss: 1, 2005, pp 41-46
Citation
R.Suganya, V.Mathumathi, "A Study on Consumer Preference towards Online Shopping with Special Reference to Working Women in Tiruchirappalli City", International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.446-451, 2018.
E-Commerce Trends in Tiruchirappalli
Review Paper | Journal Paper
Vol.06 , Issue.02 , pp.452-456, Mar-2018
Abstract
E-commerce stands for electronic commerce and pertains to trading in goods and services through the electronic medium. E-Commerce is changing the way businesses buy and sell products and services. India is showing tremendous growth in the Ecommerce. The low cost of the PC and the growing use of the Internet is one of reasons for grown e-commerce. There is a growing awareness among the business community in India about the opportunities offered by e-commerce. In future e-commerce has very bright in India with even the stock exchanges coming online providing an online stock portfolio and status with a 15 minutes delay in prices. In the next 3-5 years India will have 30-70 million internet users which equal, if not surpass, many of the developed countries. This paper highlights in India, issues involved and projects how the e-commerce market is shared by various players with an analysis of level of awareness and usage of various e-commerce services in Tiruchirappalli.
Key-Words / Index Term
E-commerce
References
[1]. Shujit, ‘e-commerce’, Aadi Publications Jaipur in India.
[2]. IAMAI Report.
[3]. www.Penn-olson.com.
[4]. www.digitalmusings.in/2017.
[5]. http://indianecommercestory.blogspot.com
[6]. www.onlinemarketinginsideout.com
Citation
V.Sujatha, B.Karthiga, "E-Commerce Trends in Tiruchirappalli", International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.452-456, 2018.
Customer Satisfaction of E-Banking Services in Tiruchirappalli Town
Review Paper | Journal Paper
Vol.06 , Issue.02 , pp.457-459, Mar-2018
Abstract
Service quality is one of the critical success factors that influence the competitiveness of an organization. A bank can differentiate itself from competitors by providing high quality service. Service quality is one of the most attractive areas for researchers over the last decades in the retail banking sector . There is no guarantee that what is excellent service today is also applicable for tomorrow. To survive in the competitive banking industry, customer satisfaction is considered as the essence of success. Hence an attempt is made to study the Customer Satisfaction of E-Banking Services in Tiruchirappalli Town. The most important factor influencing customer satisfaction of E-Banking Services are Costs and the least important factor influencing customer satisfaction of E-banking services are Adoption. Customer satisfaction of E-Banking services are high for karur vysya Bank.
Key-Words / Index Term
Customer satisfaction ,E-Banking, Costs Adoption
References
[1]. Andreassen TW, Lindestad B.1998. ‘The Effect of Corporate Image in the Formation of Customer Loyalty’, Journal of Service Research,1(1),82-92.
[2]. Beatty SE, Smith SM.1987.’External search effect: an investigation across several product categories’, Journal of Consumer Research, 14(1), 83-95.
[3]. Choudhury K.2008. “Service Quality: insights from the Indian Banking scenario”, Australasian Marketing Journal. 16(1), 48-61.
[4]. Day GS.1994. “Capabilities of Market driven Organization”, Journal of Marketing 58(special issue), 37-52.
[5]. Gefen D, Karahanna E, Straub DW.2003. ‘Trust and TAM in Online Shopping: An Integrated Model’, MIS Quarterly, 27(1),51-90.
[6]. Gould G.1995. Why it is customer loyalty that counts (and how to measure it). Manag.Serv.Qual.,5(1):16.
[7]. Hafeez S, Hasnu S.2010.Customer satisfaction for cellular phones in Pakistan: A case study of Mobilink. Bus.Econ.Res.J., 1(3):34-44.
[8]. Kim K.2002. “Conceptualizing, measuring, and managing customer based brand Equity”. J.Mark, 57:1-22.
[9]. Shapiro C.1982. ‘Consumer Information, Product Quality, and Seller Reputation’, The Bell Journal of Economics, 13, 20-35..
Citation
V P T Dhevika, J.Saradha, "Customer Satisfaction of E-Banking Services in Tiruchirappalli Town", International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.457-459, 2018.
An Algorithm to Detect Rank Attack in RPL based 6LoWPAN Networks
Research Paper | Journal Paper
Vol.06 , Issue.02 , pp.460-463, Mar-2018
Abstract
Internet of Things (IoT) is connected with numerous number of heterogeneous devices and these devices are communicating with one another. They are deployed in low power lossy networks. These networks encounter various attacks. Such as sinkhole attack, selective forwarding, wormhole attack, rank attack. Internet Engineering Task Force (IETF) standardizes protocol for IoT. One such is IPv6 Routing Protocol for Low power and Lossy network (RPL). RPL is typically designed for IoT in the context of constrained resources. In RPL, source nodes select the preferred parent node based on the rank metric to select the optimum routes. However, the malicious node misuses the rank metric to attract its neighbor nodes. This issue is defined as the rank attack. This paper proposes an algorithm to detect the rank attack in RPL based Internet of Things.
Key-Words / Index Term
Internet of Things, RPL, Rank attack, 6LoWPAN
References
[1] Wallgren Linus, Shahid Raza, and Thiemo Voigt, "Routing attacks and countermeasures in the RPL-based internet of things", International Journal of Distributed Sensor Networks, Vol. 9, Issue. 8, 2013.
[2] Airehrour David, Jairo Gutierrez, and Sayan Kumar Ray, "A testbed implementation of a trust-aware RPL routing protocol", 27th International Telecommunication Networks and Applications Conference (ITNAC) on IEEE, pp. 1-6, 2017.
[3] Airehrour David, Jairo Gutierrez, and Sayan Kumar Ray, "Secure routing for internet of things: A survey", Journal of Network and Computer Applications 66, 2016, pp.198-213.
[4] Anhtuan Le, Jonathan Loo, Yuan Luo, Aboubaker Lasebae, “Specification-based IDS for securing RPL from topology attacks”, ISSN: 2156-9711, 2011, pp. 1-3, DOI: 10.1109/WD.2011.6098218.
[5] Le Anhtuan, Jonathan Loo, Aboubaker Lasebae, Alexey Vinel, Yue Chen, and Michael Chai, "The impact of rank attack on network topology of routing protocol for low-power and lossy networks", IEEE Sensors Journal,Vol. 13, Issue.10, 2013, pp. 3685-3692.
[6] Shreenivas Dharmini, Shahid Raza, and Thiemo Voigt, "Intrusion Detection in the RPL-connected 6LoWPAN Networks", Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, ACM, 2017, pp. 31-38.
[7] Karthik V.K. and Pushpalatha M, “Addressing attacks and security mechanism in the RPL based IoT”, International journal of computer science and engineering communications, vol.5, Issue.5, 2017, pp. 1715-1721.
[8] Alzubaidi Mahmood, Mohammed Anbar, Samer Al-Saleem, Shadi Al-Sarawi, and Kamal Alieyan, "Review on mechanisms for detecting sinkhole attacks on RPLs", Information Technology (ICIT), 8th International Conference on. IEEE, 2017, pp.369-374.
[9] Medjek, F., Tandjaoui, D., Romdhani, I., and Djedjig, N, “A Trust-based Intrusion Detection System for Mobile RPL Based Networks”, In IEEE 10th International Conference on Internet of Things, 2017.
[10] Fu, Y., Yan, Z., Cao, J., Koné, O., and Cao, X, “An Automata Based Intrusion Detection Method for Internet of Things”, Mobile Information Systems, 2017.
[11] Shahid Raza, Linus Wallgren, and Thiemo Voigt, "SVELTE: Real-time intrusion detection in the Internet of Things", Journal on Ad hoc networks, Vol.11, Issue.08, 2013, pp. 2661-2674.
[12] Anhtuan Le, Jonathan loo, Kok Keong Chai and Mahdi Aiash, "A specification-based IDS for detecting attacks on RPL-based network topology", Information 7. Issue.2, Vol.25, 2016.
[13] Heiner Perrey, Martin Landsmann, Osman Ugus, Matthias W¨ahlisch and Thomas C. Schmidt, “TRAIL: Topology authentication in RPL”, 2013.
[14] Kevin Weekly and Kristofer Pister, "Evaluating sinkhole defense techniques in RPL networks", Network Protocols (ICNP), 20th IEEE International Conference on. IEEE, 2012, pp. 1-6.
[15] Christian Cervantes, Diego Poplade, Michele Nogueira and Aldri Santos, "Detection of sinkhole attacks for supporting secure routing on 6lowpan for internet of things", Integrated Network Management (IM), IFIP/IEEE International Symposium on. IEEE, 2015.
[16] A. Rehman, M. M. Khan, M. A. Lodhi and F. B. Hussain, “Rank attack using objective function in RPL for low power and lossy networks”, International Conference on Industrial Informatics and Computer Systems (CIICS), 2016, pp. 1-5, DOI: 10.1109/ICCSII.2016.7462418.
[17] Airehrour David, Jairo Gutierrez, and Sayan Kumar Ray, "Secure routing for internet of things: A survey", Journal of Network and Computer Applications 66, 2016, pp.198-213, http://dx.doi.org/10.1016/j.jnca.2016.03.006.
Citation
R. Stephen, A. Dalvin Vinoth Kumar, L. Arockiam, "An Algorithm to Detect Rank Attack in RPL based 6LoWPAN Networks", International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.460-463, 2018.
Survey on Disease Diagnostic using Data Mining Techniques
Survey Paper | Journal Paper
Vol.06 , Issue.02 , pp.464-467, Mar-2018
Abstract
Data mining is a large collection of data into knowledge. It is a process of discovering interesting patterns and knowledge from large amounts of data. The data sources can include databases, data warehouses, the Web, other information repositories, or data that are streamed into the system dynamically. In data mining, classification is an important function that assigns items in a collection to target categories or classes. The goal of the classification is to accurately predict the target class for each data points. It is a very important technique where large data are classified to retrieve relevant information. There are several classification techniques are available, which includes decision tree algorithm, Bayesian networks, k-nearest neighbor classifier, case-based reasoning, genetic algorithm, adaboost, random forest algorithm and fuzzy logic techniques. This paper proposes the survey of various classification techniques in data mining for healthcare. It also compares the classification techniques and produces the result based on the accuracy level.
Key-Words / Index Term
Data mining, Classification, Decision tree, Bayesian networks, Genetic algorithm
References
[1] BDCN Prasad, P. E. S. N Krishna Prasad and Y Sagar, “An approach to develop expert systems in medical diagnosis using machine learning algorithms (Asthma) and a performance study”, International Journal on Soft Computing, Vol. 2, No. 1, pp 26-33, 2011.
[2] J. Cathrin Princy, K.Sivaranjani, “Survey on Asthma Prediction Using Classification Technique”, International Journal of Computer Science and Mobile Computing, ISSN: 2320 088X, Vol. 5, No. 7, pp 515 – 518, July 2017.
[3] Chaurasia, V. and Pal, S., “Data Mining Approach to Detect Heart Disease”, International Journal of Advanced Computer Science and Information Technology (IJACSIT), Vol. 2, pp 56-66, 2013.
[4] E. Chatzimichail, E. Parakakis and A. Rigas, “Predicting asthma outcome using partial least square regression and artificial neural networks”, Advances in Artificial Intelligence, Article ID 435321, pp 1-7, 2013.
[5] Ephzibah, E.P., “ Cost Effective Approach on Feature Selection using Genetic Algorithms and Fuzzy Logic for Diabetes Diagnosis”, International Journal on Soft Computing (IJSC), Vol.2, pp 1-10, 2011.
[6] Gulia, A., Vohra, R. and Rani, P., “Liver Patient Classification Using Intelligent Techniques”, International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 5, pp 5110-5115, 2014.
[7] Iyer, A., Jeyalatha, S. and Sumbaly, R., “Diagnosis of Diabetes Using Classification Mining Techniques”, International Journal of Data Mining & Knowledge Management Process (IJDKP), Vol. 5, pp 1-14, 2015.
[8] Kumari, V.A. and Chitra, R., “Classification of Diabetes Disease Using Support Vector Machine”, International Journal of Engineering Research and Applications (IJERA), Vol.3, pp 1797-1801, 2013.
[9] Nahit Emanet, Halil R Oz, Nazan Bayram and Dursun Delen, “A comparative analysis of machine learning methods for classification type decision problems in healthcare”, Decision Analytics, Vol. 1, No. 6, pp 1-20, 2014.
[10] Otoom, A.F., Abdallah, E.E., Kilani, Y., Kefaye, A. and Ashour, M., “Effective Diagnosis and Monitoring of Heart Disease”, International Journal of Software Engineering and Its Applications. Vol. 9, pp 143-156, 2015.
[11] Rajeswari, P. and Reena, G.S., “Analysis of Liver Disorder Using Data Mining Algorithm”, Global Journal of Computer Science and Technology, Vol.10, pp 48-52, 2010.
[12] Sarwar, A. and Sharma, V., “Intelligent Naïve Bayes Approach to Diagnose Diabetes Type-2”, Special Issue of International Journal of Computer Applications (0975-8887) on Issues and Challenges in Networking, Intelligence and Computing Technologies(ICNICT), Vol.3, pp 14-16, 2012.
[13] A.K. Shafreen Banu, S. Hariganesh, “A Novel Feature Selection Algorithm for Dimensionality Reduction in Microarray Datasets”, International Journal of ChemTech Research, ISSN: 2455 9555, Vol. 10, No.14, pp 190-197, 2017.
[14] Taha Samad Soltani Heris, Mostafa Langarizadeh, Zahra Mahmood and, Maryam Zolnoori, “Intelligent diagnosis of Asthma using machine learning algorithms”, International Research Journal of Applied and Basic Sciences, Vol. 5, No. 1, pp 140 – 145, 2013.
[15] Tan, K.C., Teoh, E.J., Yu, Q. and Goh, K.C., “A Hybrid Evolutionary Algorithm for Attribute Selection in Data Mining”, Journal of Expert System with Applications, Vol. 36, pp 8616-8630, 2009.
[16] Vijayarani, S. and Dhayanand, S., “Liver Disease Prediction using SVM and Naïve Bayes Algorithms”, International Journal of Science, Engineering and Technology Research (IJSETR), Vol. 4, pp 816-820, 2015.
Citation
K. Sivaranjani, A. Nisha Jebaseeli, "Survey on Disease Diagnostic using Data Mining Techniques", International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.464-467, 2018.
Exploration on the Algorithms in Data Mining using AI Techniques
Review Paper | Journal Paper
Vol.06 , Issue.02 , pp.468-470, Mar-2018
Abstract
Artificial Intelligence(AI) is an emerging technology which brings innovation to the society by simulating human intelligence which are processed by machines. This AI technique is classified into two types such as Supervised and Unsupervised where the supervised classify the data using networks and an unsupervised uses genetic algorithm for the finding of hidden relationship betweendata.The data mining, which is used in artificial intelligence for various purposes such as segmentation, classification of data, diagnosis of images and also prediction problem. This paper gives a detailed description about the survey of machine learning techniques in artificial intelligence by using remote sensing imaginary mining and pattern recognition technique.
Key-Words / Index Term
Artificial Intelligence, machines, supervised, unsupervised, mining
References
[1] “Artificial Intelligence Tutorial” https://www.tutorialspoint.com/artificial_intelligence/index.htm
[2] “Artificial Intelligence “ https://en.wikipedia.org/wiki/Artificial_intelligence
[3] “Artificial intelligence” http://searchcio.techtarget.com/definition/AI
[4] “Artificial intelligence” https://www.edx.org/micromasters/columbiax-artificial-intelligence
[5] G.S.Navale,NishanthDudhwala,KunalJadhav,PawanGabda, brijkishorevihangam, “prediction of stock market using data mining & AI” International Journal of Computer Applications (0975 – 8887) Volume 134 – No.12, January 2016
[6] Nelson.Sizwe,Madonsela,paulin.Mbecke,CharlesMbohwa.,”Integrating Artificial Intelligence into Data Warehousing and Data Mining” Proceedings of the World Congress on Engineering and Computer Science 2015 Vol II WCECS 2015, October 21-23, 2015.
[7] Ms. Aruna J. Chamatkar ” An Artificial Intelligence for Data Mining” IOSR Journal of Computer Science (IOSR-JCE) e-ISSN: 2278-0661, p-ISSN: 2278-8727 PP 53-57
[8] Xindong Wu1, “Data Mining: An AI Perspective” IEEE Computational Intelligence Bulletin December 2004 Vol.4 No.2
[9] KatarínaHilovska “Application of Artificial Intelligence and Data Mining Techniques to Financial Markets” ACTA VSFS, 2012, vol. 6, issue 1, 62-76.
[10] PinkiSolanki and GirdharGopal “Image Categorization Using Improved Data Mining Technique” Big Data Analytics, Advances in Intelligent Systems and Computing 654, https://doi.org/10.1007/978-981-10-6620-7_19
[11] Haoyuan Hong ParaskevasTsangaratosIoanna Ilia ,JunzhiLiu,A-Xing Zhu, Wei Chen “Application of fuzzy weight of evidence and data mining techniques in construction of flood susceptibility map of Poyang County, China” Science of the Total Environment 625 (2018) 575–588(2017)
[12] MuneoKushima, Kenji Araki, Tomoyoshi Yamazaki, Sanae Araki, TaisukeOgawa,NoboruSonehara ”Text Data Mining of Care Life Log by the Level of Care Required Using KeyGraph” Proceedings of the International MultiConference of Engineers and Computer Scientists 2017 Vol I,
IMECS 2017, March 15 - 17, 2017
[13] Maurice Dawson, Max Lieble, and AdewaleAdeboje “Open Source Intelligence: Performing DataMining and Link Analysis to Track TerroristActivities”Information Technology – New Generations, Advances in Intelligent Systems and Computing 558, DOI 10.1007/978-3-319-54978-1_22
[14] Jorge Pires, Manuel Pérez Cota, Álvaro Rocha and Ramiro Gonçalves “Towards a New Approach of Learning:Learn by Thinking Extendingthe Paradigm Through Cognitive Learning and Artificial Intelligence Methods to Improve Special EducationNeeds"Developments and Advances in IntelligentSystems and Applications, Studies in Computational Intelligence 718, DOI 10.1007/978-3-319-58965-7_18
[15] Elayne Rubio Delgado, Lisbeth Rodríguez-Mazahua,Silvestre Gustavo Peláez-Camarena, José Antonio PaletGuzmánand AsdrúbalLópez-Chau “Association Analysis of Medical Opinions About the Non-realization of Autopsies in a Mexican Hospital “New Perspectives on Applied Industrial Tools and Techniques, Management and Industrial Engineering,DOI 10.1007/978-3-319-56871-3_12
[16] Philippe Blondel “Quantitative Analyses of Morphological Data “ Submarine Geomorphology, Springer Geology” DOI 10.1007/978-3-319-57852-1_5
[17] H.S. SushmaRao, Aishwarya Suresh and VinayakHegde “Academic Dashboard—Descriptive Analytical Approach to Analyze Student Admission Using Education Data Mining “ Information and Communication Technology for Sustainable Development, Lecture Notes in Networks and Systems 10, https://doi.org/10.1007/978-981-10-3920-1_43
[18] MainazFaridi, SeemaVerma and Saurabh Mukherjee “Integration of GIS, Spatial Data Mining, and Fuzzy Logic for Agricultural Intelligence” Soft Computing: Theories and Applications, Advances in Intelligent Systems and Computing
Citation
M.Swathy, K.Subash, D.S.Ravi, "Exploration on the Algorithms in Data Mining using AI Techniques", International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.468-470, 2018.
A Survey on Scalability in Cloud Computing
Survey Paper | Journal Paper
Vol.06 , Issue.02 , pp.470-774, Mar-2018
Abstract
Cloud computing is a new paradigm that offers several advantages in terms of scalability, maintainability, high availability, efficiency and data processing. Cloud computing is a technique that has a great capabilities and benefits for users. Cloud characteristics encourage many organizations to move to this technology. But many consideration faces transmission process. This paper outline some of these considerations and considerable efforts solved cloud scalability Issues.
Key-Words / Index Term
Cloud Computing, Scalability, Vertical & Horizontal Scalability, Cloud Store
References
[1] Zhen Xiao, Senior Member, IEEE, Qi Chen, and HaipengLuo, “Automatic Scaling of Internet applications for Cloud Computing Services”, IEEE, Vol. 63, No. 5, May 2014.
[2] J.Lee and S. Kim, "Software Approaches to Assuring High Scalability in Cloud Computing," in IEEE International Conference on E-Business Engineering, 2010.
[3] B.Furht and A. Escalante, in Hand Book of Cloud Computing, Springer, 2010.
[4] T.Chieu, A.Mohindra and A. Karve, "Scalability and Performance of Web Applications in a Compute Cloud," in E-Business Engineering (ICEBE), 2011.
[5] L.Vaquero, L.Rodero-Merino and R. Buyya, "Dynamically Scaling Applications in the Cloud," ACM SIGCOMM Computer Communication Review, pp.45-52, January 2011.
[6] S.L.Mewada, U.K. Singh, P. Sharma, "Security Enhancement in Cloud Computing (CC)", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.31-37, 2013.
[7] C. Wang, K. Ren, W. Lou and J. Li,“Towards publicly auditable secure cloud data storage services,” IEEE Network Magazine, vol. 24, no. 4, pp. 19–24, 2010.
[8] KunalSuthar, Parmalik Kumar, Hitesh Gupta, “SMDS: secure Model for Cloud Data Storage”, International Journal of Computer applications, vol56, No.3, October 2012.
[9] Q. Wang, C.Wang, Wenjing Lou, Jin Li,“Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing,” IEEE transaction on parallel and distributed systems, VOL. 22, NO. 5, 2011.
[10] A. Sharma, RS Thakur, S. Jaloree, "Investigation of Efficient Cryptic Algorithm for Storing Video Files in Cloud", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.6, pp.8-14, 2016
[11] Ayad F. Barsoum and M. Anwar Hasan,” Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems”, University of Waterloo, Ontario, Canada. IEEE transactions on parallel and distributed systems vol: pp no: 99 year 2013
[12] R.Piplode, P. Sharma and U.K. Singh, "Study of Threats, Risk and Challenges in Cloud Computing", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.26-30, 2013
[13] Hsiao-Ying Lin, Member, IEEE, and Wen-Guey Tzeng, Member, IEEE.,” A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding”, IEEE transactions on parallel and distributed systems,vol.23,no. 6, pp.995-1003 ,June 2012.
[14] Thomas Erl, Zaigham Mahmood, and Ricardo Puttini. Cloud Computing: Concepts, Technology & Architecture. Prentice Hall, 2013.
[15] Vaquero LM, Rodero-Merino L, Buyya R. dynamically scaling applications in the cloud. ACM Computer Communication Review 2011, vol. 41, no. 1, pp. 45–52. DOI: 10.1145/1925861.1925869
[16] Marshall P, Keahey K, Freeman T. Elastic site: using clouds to elastically extend site resources. In Proceedings of IEEE International Symposium on Cluster Computing and the Grid 2010, pp. 43–52. DOI: 10.1109/CCGRID.2010.80
[17] M. Sudha, Dr.Bandaru Rama Krishna Rao, M. Monica,” A Comprehensive Approach to Ensure Secure Data Communication in Cloud Environment” International Journal of Computer Applications (0975 – 8887) Volume 12– No.8, December 2010
[18] Dr.K.Chitra, B.Jeevarani, “Study on Basically Available, Scalable and Eventually Consistent NOSQL Databases”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol 3 (4), July - 2013, ISSN: ISSN: 2277–128, pp. 1-5.
Citation
C. Venish raja, L. Jayasimman, "A Survey on Scalability in Cloud Computing", International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.470-774, 2018.