An Enhanced and Secure Approach of Load Balancing in Cloud Computing
Research Paper | Journal Paper
Vol.2 , Issue.8 , pp.112-116, Aug-2014
Abstract
The load balancing problem is the most divergent job to be achieved while dealing with Cloud Computing. Along with load balancing accomplishment, various access Control mechanisms are to be forked with. DAC, MAC,RBAC are such access controls that have already been developed. But as the number of clients are trafficking the network, so do the problems. This paper deals with all such problems which are posing a great threat to the users while accessing the internet. It does all this by checking the specifications of virtual machines by the use of surveys. It will help in saving time as well as cost factor.
Key-Words / Index Term
Cloud Computing, Load Balancing, Queuing Problem, Job Mapping Policy, Distributed Policy, ASP.NET
References
[1] A B M Moniruzzaman, K. W. Nafi, S. A. Hossain, � An Experimental Study of Load Balancing of Open Nebula Open- Source Cloud Computing Platform�, in 3rd International Conference on Informatics, Electronics & Vision (ICIEV), Technical Co-Sponsor: IEEE Computer Society, 2014.
[2] R. Ramya, M. Krishsanth,L. Arockiam, �A State-of-Art Load Balancing Algorithms in Cloud Computing�, in International Journal of Computer Applications (0975 � 8887) Volume No.19, June 2014
[3] J. Ni, Y. Huang, Z. Luan, J. Zhang, D. Qian, �Virtual Machine Mapping Policy Based on Load Balancing in Private Cloud Environment� in 2011 International Conference on Cloud and Service Computing
[4] W. Kleiminger , E. Kalyvianaki , P. Pietzuch , �Balancing Load in Stream Processing with the Cloud�, in Proceedings of the 2011 IEEE 27th International Conference on Data Engineering workshops, p.no. 1621, ISBN : 978-1- 4244- 9195-7
[5] A. K. Sidhu and S. Kinger, �Analysis of Load Balancing Techniques in Cloud Computing, �in International Journal of Computers & Technology vol. 4, no. 2, pp. 737�741, 2013.
[6] G. Xu, J. Pang, and X. Fu, �A Load Balancing Model Based on Cloud Partitioning for the Public Cloud,� in Tsinghua Science And Technology, vol. 18, no. 1, 2013.
[7] V. Kunamneni, �Dynamic Load Balancing for the Cloud,� in International Journal of Computer Science and Electrical Engineering (IJCSEE) , vol. no. 2315, pp. 33�37, 2012.
[8] K. S. Rashmi, �Enhanced Load Balancing Approach to Avoid Deadlocks in Cloud,� in Special Issue of International Journal of Computer Applications (097 � 8887) on Computing and Communication Technologies for HPC Application ACCTHPCA, June, 2012.
[9] P. Priyadarshinee and P. Jain, �Load Balancing and Parallelism in Cloud Computing,� in International Journal of Engineering and Advanced Technology (IJEAT), vol. no. 5, pp. 486�489, 2012.
[10] J. James, �Efficient VM Load Balancing Algorithm For A Cloud Computing Environment,� in International Journal on Computer Science and Engineering (IJCSE), vol. 4, no. 09, pp. 1658�1663, 2012.
[11] K. Nishant, P. Sharma, V. Krishna, C. Gupta, K. P. Singh, and R. Rastogi, �Load Balancing of Nodes in Cloud Using Ant Colony Optimization,� in 2012 UKSim 14th Int. Conf. Comput. Model. Simul., pp. 3�8, Mar. 2012.
[12] R. Koteshwaramma, �Client-Side Load Balancing and Resource Monitoring in Cloud,� in International Journal of Engineering Research and Applications, vol. 2, no. 6, pp. 167� 171, 2012.
[13] Z. Chaczko, V. Mahadevan, and C. Mcdermid,�Availability Load Balancing in Cloud Computing,� in International Conference on Computer and Software Modeling IPCSIT vol. 14, pp. 134� 140, 2011.
[14] K. Amandeep, B. Nitish, " Cross Breed job scheduling for reducing server load using RBAC at Cloud", in IJARCSSE ,Vol. 3, May 2013
Citation
R. Gupta, R. Bhatia, "An Enhanced and Secure Approach of Load Balancing in Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.2, Issue.8, pp.112-116, 2014.
Weighted Word Affinity Graph for Betterment of Spatial Information Descriptors
Short Communication | Journal Paper
Vol.2 , Issue.8 , pp.117-120, Aug-2014
Abstract
Document analysis/ retrieval system plays crucial role to strengthen any information retrieval system. There are various processing stages associated with a document analysis system, such as feature extraction stage, semantic representation stage, dimensionality reduction stage and similarity measure stage. Researchers are contributing well in every stage to improve the performance of the document analysis system. This short paper considers word affinity graph/ matrix for further improvement so that semantic representation can be given more precisely. This is accomplished by incorporating weight component in the word affinity matrix to provide significance for degree of distribution. Theoretical study on both word affinity matrix and weighted word affinity matrix shows the significance offering by them on widely distributed document terms.
Key-Words / Index Term
Document analysis/ retrieval system plays crucial role to strengthen any information retrieval system. There are various processing stages associated with a document analysis system, such as feature extraction stage, semantic representation stage, dimensionality reduction stage and similarity measure stage. Researchers are contributing well in ever
References
[1] Song Mao, Azriel Rosenfeld, Tapas Kanungo, �Document structure analysis algorithms: a literature survey�, DRR 2003, 2003, p.p. 197-207
[2] Carsten Gorg, Zhicheng Liu, Jaeyeon Kihm, Jaegul Choo, Haesun Park, Member, and John Stasko, �Combining Computational Analyses and Interactive Visualization for Document Exploration and Sensemaking in Jigsaw�, IEEE Transactions on Visualization and Computer Graphics, Vol. 19, No. 10, 2013, p.p. 1646 � 1663
[3] Jinxi Xu Amherst, W. Bruce Croft, �Query expansion using local and global document analysis�, Proceedings of the 19th annual international ACM SIGIR conference on Research and development in information retrieval, 1996, p.p. 4-11
[4] G. Salton, M. McGill, Eds. �Introduction to Modern Information Retrieval�, New York: McGraw-Hill, 1983.
[5] S. Deerwester and S. Dumais, �Indexing by latent semantic analysis,� J. Amer. Soc. Inf. Sci., vol. 41, no. 6, 1990, pp. 391�407.
[6] Haijun Zhang, John K. L. Ho, Q. M. Jonathan Wu, Senior Member, IEEE, and Yunming Ye, �Multidimensional Latent Semantic Analysis Using Term Spatial Information�, IEEE Transactions on Cybernetics, Vol. 43, No. 6, 2013, p.p. 1625- 1640
[7] W. B. Frakes and R. Baeza-Yates, �Information Retrieval: Data Structures and Algorithms�, Prentice-Hall, Englewood Cliffs, NJ, 1992.
[8] Antoniol, G. ; Canfora, G. ; Casazza, G. ; De Lucia, A; �Information retrieval models for recovering traceability links between code and documentation�, Proceedings of International Conference on Software Maintenance, 2000, p.p. 40-49
[9] Yu-Gang Jiang ; Yang, J. ; Chong-Wah Ngo ; Hauptmann, A.G.; �Representations of Keypoint-Based Semantic Concept Detection: A Comprehensive Study�, IEEE Transactions on Multimedia, Vol. 12, No. 1, Jan. 2010, p.p. 42 � 53.
[10] Eaddy, M. ; Antoniol, G. ; Gueheneuc, Y.-G., �CERBERUS: Tracing Requirements to Source Code Using Information Retrieval, Dynamic Analysis, and Program Analysis�, 16th IEEE International Conference on Program Comprehension (ICPC 2008), 10-13 June 2008, p.p. 53 - 62
[11] G. Antoniol, G. Canfora, G. Casazza, A. De Lucia, E. Merlo, "Recovering Traceability Links between Code and
Documentation," IEEE Transactions on Software Engineering, Vol .28, No. 10, 2002, p.p.970�983
[12] D. Poshyvanyk, Y.-G. Gu�h�neuc, A. Marcus, G. Antoniol,
V. Rajlich, "Feature Location Using Probabilistic Ranking of Methods Based on Execution Scenarios and Information Retrieval," IEEE Transactions on Software Engineering, Vol. 33, No. 6, 2007, p.p.420�432.
[13] Akiko Aizawa, �An information-theoretic perspective of tf�idf measures�, Information Processing and Management, Vol. 39, 2003, p.p. 45�65
[14] Wray Buntine and Aleks Jakulin, �Applying discrete PCA in data analysis�, Proceedings of the 20th conference on Uncertainty in artificial intelligence, 2004, p.p. 59-66
Citation
P. Yadav, "Weighted Word Affinity Graph for Betterment of Spatial Information Descriptors," International Journal of Computer Sciences and Engineering, Vol.2, Issue.8, pp.117-120, 2014.
Secure Cloud Data Sharing Using Key-Aggregate Cryptosystem
Short Communication | Journal Paper
Vol.2 , Issue.8 , pp.121-123, Aug-2014
Abstract
Cloud computing is used to store and share data by anyone from anywhere in the world. It provides scalable and on demand self services. The cloud data expect maximum security at rest state as well as at transit state. Service providers provide security to the data in the cloud and the data owner also uses some cryptographic techniques for data security. They may use symmetric cryptography or asymmetric cryptography. If the data owner use same cryptographic key for all data files, they cannot share the partial amount of data files. Because of that the owner using the separate encryption/ decryption keys for each file in the cloud. Here to provide security and avoid network burden, the data owner can aggregate all decryption keys into a single key. This aggregate key can decrypt any subset of delegated cipher text blocks.
Key-Words / Index Term
Secure data sharing; TPA; Key aggregate cryptosystem
References
[1] S.S.M. Chow, Y.J. He, L.C.K. Hui, and S.-M. Yiu, �SPICE- SimplePrivacy-Preserving Identity-Management for Cloud Environment,� Proc. 10th Int�l Conf. Applied Cryptography and Network Security (ACNS), vol. 7341, pp. 526-543, 2012.
[2] C. Wang, S.S.M. Chow, Q. Wang, K. Ren, and W. Lou, �Privacy-Preserving Public Auditing for Secure Cloud Storage,� IEEE Trans. Computers, vol. 62, no. 2, pp. 362-375, Feb. 2013.
[3] F. Guo, Y. Mu, Z. Chen, and L. Xu, �Multi-Identity Single-Key Decryption without Random Oracles,� Proc. Information Security and Cryptology (Inscrypt �07), vol. 4990, pp. 384-398, 2007.
[4] D. Boneh, C. Gentry, B. Lynn, and H. Shacham, �Aggregate and Verifiably Encrypted Signatures from Bilinear Maps,� Proc. 22nd Int�l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT �03), pp. 416-432, 2003.
[5] G.C. Chick and S.E. Tavares, �Flexible Access Control with Master Keys,� Proc. Advances in Cryptology (CRYPTO �89), vol. 435, pp. 316-322, 1989.
[6] Cheng-Kang Chu, Sherman S.M. Chow, Wen-Guey Tzeng, Jianying Zhou, and Robert H. Deng, �Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage,� in Parallel And Distributed Systems, VOL. 25, NO. 2, pp. 468-477, 2014
[7] Thamil kumaran V.C , Chithra Mol C.R , Sai Prasath, �An Impact of Implementing Various Cryptographic Techniques Efficiently in a Public Centric Cloud�, Vol 4, Issue 4, 83-86
[8] Jaydip Sen, �Security and Privacy Issues in cloud computing�, Innovation Labs, Tata Consultancy Services Ltd., Kolkata, INDIA
[9] Bharat Bhargava, Anya Kim,YounSun Cho �Research in Cloud Security and Privacy�
[10] http://en.wikipedia.org/wiki/Cloud_computing.
[11] L. Hardesty, Secure Computers Aren�t so Secure. MIT press, http://www.physorg.com/ news176107396.html, 2009.
[12] B. Wang, S.S.M. Chow, M. Li, and H. Li, �Storing Shared Data on the Cloud via Security- Mediator,� Proc. IEEE 33rd Int�l Conf. Distributed Computing Systems (ICDCS), 2013.
[13]http://en.wikipedia.org/wiki/Cloud_computing_security
Citation
M. Mathew, Sumathi D., Ranjima P, Sivaprakash P., "Secure Cloud Data Sharing Using Key-Aggregate Cryptosystem," International Journal of Computer Sciences and Engineering, Vol.2, Issue.8, pp.121-123, 2014.
Secure Cloud Storage with Access Control: A Survey
Survey Paper | Journal Paper
Vol.2 , Issue.8 , pp.124-126, Aug-2014
Abstract
Cloud computing is a technique used to refer web based services and development. It is a ubiquitous services, means anyone can access from anywhere in the world at anytime. It provides application, platform and resources to the user. It is a virtualized pool of resources. These services are provided by CSP. The main features of cloud are flexibility, elasticity, on-demand services, metered services, etc. Some large companies offer data storage spaces which are leased to others. So the devices connected to internet can achieve these services. Cloud stores data in database and replicated in different virtual machines, that can be placed anywhere in world. This may leads to some major security issues in cloud storage and retrieval. In order to prevent unauthorized access, access control techniques can be used. A user authentication verifies identity of user. While providing services; we are concern about security and privacy of the information. This survey paper introduces a detailed analysis of security and privacy preserving techniques, and a comparison among various access control mechanism.
Key-Words / Index Term
Cloud computing; Security; Attribute Based Encryption; Authentication; Access control
References
[1].Sushmita Ruj, Milos Stojmenovic et al.,�Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds�, in IEEE transactions VOL:25 NO:2 2014.
[2].S. Ruj, A. Nayak, and I. Stojmenovic,�DACC: Distributed access control in clouds,� in IEEE TrustCom, 201 1.
[3].Kan Yang, Xiaohua Jia and Kui Ren,�DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems�,IACR Cryptology ePrint Archive,419,2012.
[4]www.tcs.com/SiteCollectionDocuments/White%20Papers/HighTech_Whitepaper_Windows_Azure_09_2011.pdf
[5] http://www.w3.org/TR/2007/WD-access-control-20071001/
[6] S.Yu,C.Wang,K.Ren, and W.Lou,�Attribute based data sharing with attribute revocation,� in ACM ASIACCS, pp. 261�270, 2010.
[7] W.Wang,Z.Li,R.Owens,and B.Bhargava, �Secure and efficient access to outsourced data,� in ACM Cloud Computing Security Workshop ,2009.
[8] www.iosrjournals.org/iosr-jce/papers/Vol9-Issue2/E0922831.pdf
[9] mslab.kaist.ac.kr/twiki/pub/ContentNetworking/WebHome/L26_AC_DRM.pptx
[10] http://psrcentre.org/images/extraimages/1112106.pdf
[11] Seny Kamara, Kristin Lauter, �Cryptographic cloud storage�, Lecture Notes in Computer Science, Financial Cryptography and Data Security, pp. 136-149, vol. 6054, 2010.
[12] Kuyoro S. O., Ibikunle F. & Awodele O, �Cloud Computing Security Issues and Challenges,� in IJCN, Vol 3 :Issue (5) : 2011
[13] Abhinay B.Angadi, Akshata B.Angadi, et al., �Security Issues with Possible Solutions in Cloud Computing-A Survey,� in IJARCET, Vol 2, Issue 2, Feb 2013.
[14] Ritesh G. Anantwar, Dr. P.N. Chatur, et al., �Cloud Computing and Security Models: A Survey,� in IJESIT,Vol 1, Issue 2, Nov 2012
[15] Torry Harris, �CLOUD COMPUTING � An Overview,�
[16] http://www.slideshare.net/dattudharanikota/cloud-computing-ppt-14857120
[17] http://en.wikipedia.org/wiki/Cloud_computing
Citation
P. Ranjima, Sumathi. D , M. Mathew, P. Sivaprakash, "Secure Cloud Storage with Access Control: A Survey," International Journal of Computer Sciences and Engineering, Vol.2, Issue.8, pp.124-126, 2014.
A Framework For Processing Keyword-Based Queries In Relational Databases For Exact Record
Research Paper | Journal Paper
Vol.2 , Issue.8 , pp.127-130, Aug-2014
Abstract
Database management system a very strong concept used that is relational database management system. A relational database is often operated by means of a structured query language (SQL). When composing SQL-queries one must have an understanding of the SQL syntax to be able to produce a query the database can execute. Additionally, one must be familiar with the attributes and relations in the database to be able to retrieve the data desired. When one wants to search the available data stored in the relational database, these requirements can be discouraging. In this case keyword-based search functionality could improve the accessibility of the data. The main advantage of RDBMS is its fast accurate, standard way to store data on permanent basis extraction of data is done using SQL its secure (different level of security) data can be managed in proper manner. ACID properties are features if RDBMS stands for Accuracy Consistency Isolation Durability.
Key-Words / Index Term
RDBMS, Keyword Serach, Efficiency, Effectiveness
References
[1] B. Aditya, G. Bhalotia, S. Chakrabarti, A. Hulgeri, C. Nakhe, P. Parag, S.Sudarshan. BANKS: browsing and keyword searching in relational databases. In Proceedings of the 28th international conference on Very Large Databases, 2011.
[2] C.D Manning, P.Raghavan, H.Sch�tze. Introduction to information retrieval. ISBN 978-0-521-86571-5. Cambridge university press, Newyork, 2011.
[3] B.B. Dalvi, M. Kshirsagar, S. Sudarshan. Keyword search on external memory graphs. In Proceedings of the VLDB Endowment, Vol 1 visited on July 3th, 2010.
[4] V. Hristidis, Y Papakonstantinou. Discover: keyword search in relational databases. In Proceedings of the 28th international conference on Very Large Databases, 2002. visited on May 15th, 2009.
[5] Gaurav Bhalotia, Charuta Nakhe, Arvind Hulgeri, Soumen Chakrabarti, and Sudarshan, "Keyword Searching and Browsing in Databases UsingBANKS," In Proceedings of International Conference on Data Engineering (ICDE), pp. 431�440, 2012.
[6] Margaret Dunham, �Data Mining Introductory and Advanced Topics,�Prentice Hall, 2003.
[7] Ophir Frieder, David Grossman, Abdur Chowdhury and Gideon Frieder,�Efficiency Considerations for Scalable Information Retrieval Servers,� Journal of Digital Information (JDI), Vol. 1, No.5, 2000.
[8] Sanjay Agrawal, Surajit Chaudhuri, and Gautam Das, "DBXplorer: A system for Keyword-Based Search Over Relational Databases," In Proceedings of International Conference on Data Engineering (ICDE), pp. 5�16.
Citation
A.K. Dwivedi, A.K. Sharma, "A Framework For Processing Keyword-Based Queries In Relational Databases For Exact Record," International Journal of Computer Sciences and Engineering, Vol.2, Issue.8, pp.127-130, 2014.