For Inplant/Internship training Request, Please Download the Registration Form, Please fill the details and send back the same to kaashiv.info@gmail.com

Attribute-Based Encryption With Verifiable Outsourced Decryption

KaaShiv InfoTech, Number 1 Inplant Training Experts in Chennai.


IEEE TITLE


Attribute-Based Encryption With Verifiable Outsourced Decryption


IEEE ABSTRACT:


Attribute-based encryption (ABE) is a public-keybased one-to-many encryption that allows users to encrypt and decrypt data based on user attributes. A promising application of ABE is flexible access control of encrypted data stored in the cloud, using access polices and ascribed attributes associated with private keys and ciphertexts.One of themain efficiency drawbacks of the existing ABE schemes is that decryption involves expensive pairing operations and the number of such operations grows with the complexity of the access policy. Recently, Green et al. proposed an ABE system with outsourced decryption that largely eliminates the decryption overhead for users. In such a system, a user provides an untrusted server, say a cloud service provider, with a transformation key that allows the cloud to translate any ABE ciphertext satisfied by that user’s attributes or access policy into a simple ciphertext, and it only incurs a small computational overhead for the user to recover the plaintext from the transformed ciphertext. Security of an ABE system with outsourced decryption ensures that an adversary (including a malicious cloud) will not be able to learn anything about the encrypted message; however, it does not guarantee the correctness of the transformation done by the cloud. In this paper, we consider a new requirement of ABE with outsourced decryption: verifiability. Informally, verifiability guarantees that a user can efficiently check if the transformation is done correctly.We give the formal model of ABE with verifiable outsourced decryption and propose a concrete scheme. We prove that our new scheme is both secure and verifiable, without relying on random oracles. Finally, we show an implementation of our scheme and result of performance measurements, which indicates a significant reduction on computing resources imposed on users.



Secure Encryption and Decryption in Cloud Computing:



ABSTRACT:


Issues related to sharing information in a distributed system is one of the major practical issue consisting of autonomous entities which needs to be securely transferred in a heterogeneous multi subdivided systems. Hence the concepts of encryption and decryption are formulated to transfer the data from source to destination securely. By using an encryption/Decryption standard our distributed secure computation system show that our approach seamlessly integrates security enforcement at the user intensity with a certain trust level. A novel based method of verifying the correctness of the conversion from encryption to decryption are made. In the existing system, Private and public key are generated by the source organisation and proxy verifies the private key before issuing. But the existing system, attribute based master secret key are not unique at their attribute consideration. Hence a system is proposed so as to define as strategy to check the unique attribute based encryption using proxies and outsourced decryption.


IMPLEMENTATION:


kaashiv infotech

SCREENSHOT:


kaashiv infotech


Related URLs for reference:

s

[1] Security threats in cloud computing:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6148380&queryText%3Dcloud+computings


Cloud computing is set of resources and services offered through the Internet. Cloud services are delivered from data centers located throughout the world. Cloud computing facilitates its consumers by providing virtual resources via internet. General example of cloud services is Google apps, provided by Google and Microsoft SharePoint. The rapid growth in field of “cloud computing” also increases severe security concerns. Security has remained a constant issue for Open Systems and internet, when we are talking about security cloud really suffers. Lack of security is the only hurdle in wide adoption ofcloud computing. Cloud computing is surrounded by many security issues like securing data, and examining the utilization of cloud by the cloud computing vendors. The wide acceptance www has raised security risks along with the uncountable benefits, so is the case with cloud computing. The boom in cloud computing has brought lots of security challenges for the consumers and service providers. How the end users of cloud computing know that their information is not having any availability and security issues? Every one poses, Is their information secure? This study aims to identify the most vulnerable security threats in cloud computing, which will enable both end users and vendors to know about the key security threats associated with cloud computing. Our work will enable researchers and security professionals to know about users and vendors concerns and critical analysis about the different security models and tools proposed.


[2] Collaboration-Based Cloud Computing Security Management Framework:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6008731&queryText%3Dcloud+computing


Although the cloud computing model is considered to be a very promising internet-based computingplatform, it results in a loss of security control over the cloud-hosted assets. This is due to the outsourcing of enterprise IT assets hosted on third-party cloud computing platforms. Moreover, the lack of security constraints in the Service Level Agreements between the cloud providers and consumers results in a loss of trust as well. Obtaining a security certificate such as ISO 27000 or NIST-FISMA would help cloud providers improve consumers trust in their cloud platforms' security. However, such standards are still far from covering the full complexity of the cloud computing model. We introduce a new cloud security management framework based on aligning the FISMA standard to fit with the cloudcomputing model, enabling cloud providers and consumers to be security certified. Our framework is based on improving collaboration between cloud providers, service providers and service consumers in managing the security of the cloud platform and the hosted services. It is built on top of a number of security standards that assist in automating the security management process. We have developed a proof of concept of our framework using. NET and deployed it on a test bed cloud platform. We evaluated the framework by managing the security of a multi-tenant SaaS application exemplar.


[3] Realization of open cloud computing federation based on mobile agent:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=5358085&queryText%3Dcloud+computing


Although cloud computing is generally recognized as a technology which will has a significant impact on IT in the future. However, Cloud computing is still in its infancy, currently, there is not a standard available for it, portability and interoperability is also impossible between different Cloud ComputingService Providers, therefore, handicaps the widely deploy and quick development of cloud computing, there is still a long distance to the fine scenery which theoretically depicted by cloud computing. We analyze the problems in the current state of the art, put forward that Open Cloud Computing Federation is an inevitable approach for the widely use of cloud computing and to realize the greatest value of it. Accordingly, we proposal the MABOCCF (Mobile Agent Based Open Cloud Computing Federation) mechanism in this paper, it combines the advantages of Mobile Agent and cloud computing to provide a realization for the Open Cloud Computing Federation, MABOCCF can span over multiple heterogeneous Cloud Computing platforms and realizes portability and interoperability, it can be a beginning of open cloud computing federation and a future part of cloud computing. We also present in this paper the rationalities and the motivations for the combination of Mobile Agent and CloudComputing, finally, a prototype is given with a performance analysis.


[4] CDA: A Cloud Dependability Analysis Framework for Characterizing System Dependability in Cloud Computing Infrastructures:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6385066&queryText%3Dcloud+computing


Cloud computing has become increasingly popular by obviating the need for users to own and maintain complex computing infrastructure. However, due to their inherent complexity and large scale, productioncloud computing systems are prone to various runtime problems caused by hardware and software failures. Dependability assurance is crucial for building sustainable cloud computing services. Although many techniques have been proposed to analyze and enhance reliability of distributed systems, there is little work on understanding the dependability of cloud computing environments. As virtualization has been an enabling technology for the cloud, it is imperative to investigate the impact of virtualization on the cloud dependability, which is the focus of this work. In this paper, we present a cloud dependability analysis (CDA) framework with mechanisms to characterize failure behavior in cloud computing infrastructures. We design the failure-metric DAGs (directed a cyclic graph) to analyze the correlation of various performance metrics with failure events in virtualized and non-virtualized systems. We study multiple types of failures. By comparing the generated DAGs in the two environments, we gain insight into the impact of virtualization on the cloud dependability. This paper is the first attempt to study this crucial issue. In addition, we exploit the identified metrics for failure detection. Experimental results from an on-campus cloud computing test bed show that our approach can achieve high detection accuracy while using a small number of performance metrics.


[5] Research on cloud computing security problem and strategy:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6202020&queryText%3Dcloud+computing


The cloud computing is a new computing model which comes from grid computing, distributedcomputing, parallel computing, virtualization technology, utility computing and other computer technologies and it has more advantage characters such as large scale computation and data storage, virtualization, high expansibility, high reliability and low price service. The security problem of cloudcomputing is very important and it can prevent the rapid development of cloud computing. This paper introduces some cloud computing systems and analyzes cloud computing security problem and its strategy according to the cloud computing concepts and characters. The data privacy and service availability in cloud computing are the key security problem. Single security method cannot solve the cloud computing security problem and many traditional and new technologies and strategies must be used together for protecting the total cloud computing system.


[6] The issues of cloud computing security in high-speed railway:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6023923&queryText%3Dcloud+computing


Cloud computing has brought new changes and opportunities to IT industry. It is the result of the evolution of a variety of techniques. And the railway department will use the cloud computing technology to achieve the sharing of the railway information resources and to improve the capacity of information processing. But with the development of the cloud computing, it also faced with many difficulties, cloudcomputing security has become the leading cause of impeding its development. Cloud computingsecurity has become a hot topic in industry and academic research. This paper will explore the status of the development of cloud computing security, analyze the data privacy, security auditing, data monitoring and other challenges that the cloud computing security faced with. We will describe the solutions which the industry and academia proposed for some key issues of cloud computing security, such as virtualization security and traffic monitoring between virtual machines and so on. And we analyzed the security of cloud computing in railway environment. We proposed a cloud computing security reference framework. The purpose of this paper is attempted to bring greater clarity landscape about cloud computing security.


[7] Cloud computing security threats and responses:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6014715&queryText%3Dcloud+computing


Cloud computing is one of today's most exciting technologies due to its ability to reduce costs associated with computing while increasing flexibility and scalability for computer processes. During the past few years, cloud computing has grown from being a promising business idea to one of the fastest growing parts of the IT industry. IT organizations have expresses concern about critical issues (such as security) that exist with the widespread implementation of cloud computing. These types of concerns originate from the fact that data is stored remotely from the customer's location; in fact, it can be stored at any location. Security, in particular, is one of the most argued-about issues in the cloud computingfield; several enterprises look at cloud computing warily due to projected security risks. The risks of compromised security and privacy may be lower overall, however, with cloud computing than they would be if the data were to be stored on individual machines instead of in a so - called "cloud" (the network of computers used for remote storage and maintenance). Comparison of the benefits and risks of cloud computing with those of the status quo are necessary for a full evaluation of the viability ofcloud computing. Consequently, some issues arise that clients need to consider as they contemplate moving to cloud computing for their businesses. In this paper I summarize reliability, availability, and security issues for cloud computing (RAS issues), and propose feasible and available solutions for some of them.


[8] Cloud Computing learning:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6110925&queryText%3Dcloud+computing


Cloud Computing is evolving as a key technology for sharing resources. Grid Computing, distributedcomputing, parallel computing and virtualization technologies define the shape of a new era. Traditional distance learning systems lack reusability, portability and interoperability. This paper sees cloudcomputing ecosystem as a new opportunity in designing cloud computing educational platforms where learning actors can reuse learning resources handled by cloud educational operating systems. To enhance learning objects portability and interoperability not only cloud computing API standards should be advocated by the key cloud providers but also learning resources standards should be defined by the Open Cloud Computing Education Federation as proposed by this paper.


[9] Research of cloud computing security in digital library:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6703173&queryText%3Dcloud+computing


The cloud computing security in digital library was analyzed, for the digital books borrow, cloud storage and other related issues, a specific application of homomorphic encryption mechanism about library cloud computing was proposed. Firstly, the cloud computing mode of library digital resources is defined, a variety of collections databases and network resources adopt cloud computing mode to provide their service, these resources and service are placed in the cloud. And then the cloud key distribution scheme to adapt to library applications was presented, the improved traditional PKI, the PKI-based cloud computing communication and privacy protection mechanisms for library are introduced. The corresponding solution detail are proposed also: library cloud computing key distribution, authentication and encryption methods, more secure homomorphic encryption mechanism for library information retrieval. Preliminary analysis indicates that, these measures can protect the privacy and information security of library cloud computing.


[10] Cooperative cloud computing in research and academic environment using Virtual Cloud:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6375445&queryText%3Dcloud+computing


Cloud computing is becoming as a main choice computing paradigm for the enterprises. Use of cloudcomputing technologies is increasing by every passing day. It has great advantages of on-demandcomputing, scalability, proactive resource management, better application throughput, and enhanced security. Due to its openness and adaptability, it can be a good option for voluntary resource computing among non-profit organizations. In this paper, we present a model for cooperative cloud computing among research institutes and universities using Virtual Cloud concepts. The propose model of Cooperative Cloud Computing encompasses the concepts of cloud federation and volunteer computing and is based on our Virtual Cloud architecture. The cooperative cloud computing can be performed at a global scale among universities and research centers (institutes) located in different continents. In this model, institutes get benefited with a much higher computing power available through cloud federation.

[11] Property-Based Remote Attestation Oriented to Cloud Computing:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6128280&queryText%3Dcloud+computing


As the new computing service pattern of cloud computing develops rapidly, the security problem ofcloud computing has become a hot research topic. Before the user passes important data orcomputing task to the cloud, the user of the cloud may want to verify the trusted status of the platform which actually carries out the computing task in the cloud. And the remote attestation mechanism in Trusted Computing is suited for the cloud user's verification need. In this paper, the property-based remote attestation mechanism in Trusted Computing is imported into clouding computing, and a property-based remote attestation method oriented to cloud computing is designed based on the characteristics of cloud computing. In this method, through the attestation proxy, the remote attestation of the computing platform's security property is realized without disclosing the platform's configuration, and users can validate the security property of the actual computing platform in the virtual cloud computing environment.


[12] Green Cloud Computing: Balancing Energy in Processing, Storage, and Transport:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=5559320&queryText%3Dcloud+computing


Network-based cloud computing is rapidly expanding as an alternative to conventional office-basedcomputing. As cloud computing becomes more widespread, the energy consumption of the network and computing resources that underpin the cloud will grow. This is happening at a time when there is increasing attention being paid to the need to manage energy consumption across the entire information and communications technology (ICT) sector. While data center energy use has received much attention recently, there has been less attention paid to the energy consumption of the transmission and switching networks that are key to connecting users to the cloud. In this paper, we present an analysis of energy consumption in cloud computing. The analysis considers both public and private clouds, and includes energy consumption in switching and transmission as well as data processing and data storage. We show that energy consumption in transport and switching can be a significant percentage of total energy consumption in cloud computing. Cloud computing can enable more energy-efficient use of computing power, especially when the computing tasks are of low intensity or infrequent. However, under some circumstances cloud computing can consume more energy than conventional computingwhere each user performs all computing on their own personal computer (PC).


[13] Research on cloud computing data security model based on multi-dimension:



http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6291448&queryText%3Dcloud+computing


Cloud computing is considered to be the next generation of information technology framework. It is the next generation computing platforms that can provide dynamic resource pools, virtualization and high availability. The new character brings a lot of new security challenges which have not been taken into account completely in the current cloud computing system. As a consequence, to build a cloud computing data security system is the basis to build cloud computing security system. In this article, the cloud computing technology architecture and the cloud computing data security features are the first to be studied and considered, then the cloud computing data security model is raised. At last, the realization of data security model has been researched. The model adopts a multi-dimension architecture of three - layers defense. First of all, user authentication is required to ensure that user data cannot be tampered. Users who pass the anthentication can get relative operation on the user data, such as addition, modification, deletion. If the unauthorized user use illegal means to deceive the authentication system, the file entered the system encrypt and privacy defense levels. In this layer, user data is encrypted. If key has been got by the intruder. The user data cannot be got valid information even it is obtained through function of privacy protection. It is very important for commercial users of the cloud computing to protect their business secrets. The last is the file quick regeneration layer, user data can get maximum regeneration even it is damaged through rapid regeneration algorithm in this layer. Each layer accomplishes its own job and combines with others to ensure data security in the cloud computing.


[14] Modeling and simulation of cloud computing: A review:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6486505&queryText%3Dcloud+computing


Cloud computing provides computing resources as a service over a network. As rapid application of this emerging technology in real world, it becomes more and more important how to evaluate the performance and security problems that cloud computing confronts. Currently, modeling and simulation technology has become a useful and powerful tool in cloud computing research community to deal with these issues. In this paper, to the best of our knowledge, we review the existing results on modeling and simulation of cloud computing. We start from reviewing the basic concepts of cloud computing and its security issues, and subsequently review the existing cloud computing simulators. Furthermore, we indicate that there exist two types of cloud computing simulators, that is, simulators just based on software and simulators based on both software and hardware. Finally, we analyze and compare features of the existing cloud computing simulators.


[15] Cloud computing - concepts, architecture and challenges:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6203873&queryText%3Dcloud+computing


With the advent internet in the 1990s to the present day facilities of ubiquitous computing, the internet has changed the computing world in a drastic way. It has traveled from the concept of parallelcomputing to distributed computing to grid computing and recently to cloud computing. Although the idea of cloud computing has been around for quite some time, it is an emerging field of computer science. Cloud computing can be defined as a computing environment where computing needs by one party can be outsourced to another party and when need be arise to use the computing power or resources like database or emails, they can access them via internet. Cloud computing is a recent trend in IT that moves computing and data away from desktop and portable PCs into large data centers. The main advantage of cloud computing is that customers do not have to pay for infrastructure, its installation, required man power to handle such infrastructure and maintenance. In this paper we will discuss what makes all this possible, what is the architectural design of cloud computing and its applications.


[16] New Instructional Models for Building Effective Curricula on Cloud Computing Technologies and engineering :

http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6735405&queryText%3Dcloud+computing


This paper presents ongoing work to develop advanced education and training course on the CloudComputing technologies foundation and engineering by a cooperating group of universities and the professional education partners. The central part of proposed approach is the Common Body of Knowledge in Cloud Computing (CBK-CC) that defines the professional level of knowledge in the selected domain and allows consistent curricula structuring and profiling. The paper presents the structure of the course and explains the principles used for developing course materials, such as Bloom's Taxonomy applied for technical education, and andragogy instructional model for professional education and training. The paper explains the importance of using the strong technical foundation to build the course materials that can address interests of different categories of stakeholders and roles/responsibilities in the Cloud Computing services provisioning and operation. The paper provides a short description of summary of the used Cloud Computing related architecture concepts and models that allow consistent mapping between CBK-CC, stakeholder roles/responsibilities and required skills, explaining also importance of the requirements engineering stage that provides a context for cloudbased services design. The paper refers to the ongoing development of the educational course on Cloud Computing at the University of Amsterdam, University of Stavanger and provides suggestions for building advanced online training course for IT professionals.


[17] Impact of security risks on cloud computing adoption:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6120232&queryText%3Dcloud+computing


Cloud computing has been a paradigm shift in the information technology domain. It offers potential benefits to users in terms of instant availability, scalability and resource sharing, while potentially posing security issues. Especially, recent events like Amazons system failure increased the concerns related to cloud computing. Given these security and reliability concerns , we explore the optimal decision rule for moving certain IT function to public clouds. We formulate the problem as an entrepreneurial decision for an optimal stopping time at which the entrepreneur shall migrate to the cloud computing paradigm. Two different models are presented. Recognizing that an important and specific issue related to different computing paradigm is the potential "security" risk posed by each technology, we consider security risks in both models. The first model approaches the optimal adoption problem from assessing the cloud computing adoption under project value uncertainty. The entrepreneur has the timing flexibility and solves his optimal adoption decision under uncertainty. The optimal adoption rule obtained is a threshold strategy. A firm should adopt the cloud computing only if the value from the adoption exceeds the threshold level. The second model builds on a comprehensive assessment of two differentcomputing paradigms. The entrepreneur can either keep the traditional on-site computing paradigm or migrate to the cloud computing paradigm. His problem is to make the paradigm shift optimally. We model such a problem as optimally swapping two "risky" assets, which refer to benefits of the traditional on-site computing paradigm and those of the cloud computing paradigm. The term "risky" captures the fact that actual benefits can only be resolved through time, and thus estimates of benefits are embedded with uncertainty. We obtain the optimal swapping rule as a threshold strategy, defined in terms of the two benefit ratio. A firm should only shift the part of its bus- ness to the cloud computingservice if the ratio, the benefit from the cloud computing paradigm over that from the traditional on-sitecomputing paradigm, exceeds the threshold. In both models, both the extent of riskiness (i.e. uncertainty) and the significance of security risks (both in terms of potential occurrence probability and the severity of damage) affect the threshold level, thus the entrepreneurial adoption decision.


[18] A New Technique of Data Integrity for Analysis of the Cloud Computing Security:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6658038&queryText%3Dcloud+computing


Cloud computing is a latest and fast growing technology that offers an innovative, efficient and scalable business model for organizations to adopt various information technology resources i.e. software, hardware, network, storage, bandwidth etc. Cloud Computing is a jargon term without a commonly accepted non-ambiguous scientific or technical definition. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. It has the capability to incorporate multiple internal and external cloud services together to provide high interoperability there can be multiple accounts associated with a single or multiple service provider (SPs). So, Security in terms of integrity is most important aspects in cloud computing environment. In this paper, a detailed analysis of the cloud security problem is presented. Also the different problem in a cloud computing system and their effect upon the different cloud users are analyzed. It is providing a comparably scalable, position independent. Low cost platform for client's data. Since cloud computing environment is constructed based on open Architecture and interface. Based on this analysis various computing system and their effect upon the system, upon organizations and also upon different cloud users are analyzed. It is providing a comparably scalable, position-independent, low cost platform for client's data. Since cloud computing environment is constructed based on open architecture and interface. Based on this analysis various researches have also presented a view of measures that can be taken to deal with the cloud security problem and prevention that must be taken into account by any organization and cloud users seeking investment in cloud computing.


[19] Roystonea: A Cloud Computing System with Pluggable Component Architecture:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6121263&queryText%3Dcloud+computing


A Cloud computing system provides infrastructure layer services to users by managing virtualized infrastructure resources. The infrastructure resources include CPU, hyper visor, storage, and networking. Each category of infrastructure resources is a subsystem in a cloud computing system. The cloud computing system coordinates infrastructure subsystems to provide services to users. Most current cloud computing systems lacks pluggability in their infrastructure subsystems and decision algorithms, which restricts the development of infrastructure subsystems and decision algorithms incloud computing system. A cloud computing system should have the flexibility to switch from one infrastructure subsystem to another, and one decision algorithm to another with ease. This paper describes Roystonea, a hierarchical distributed cloud computing system with plug gable component architecture. The component pluggability ability gives administrators the flexibility to use the most appropriate subsystem as they wish. The component pluggability of Roystonea is based on a specifically designed interfaces among Roystonea controlling system and infrastructure subsystems components. The component pluggability also encourages the development of infrastructure subsystems in cloud computing. Roystonea provides a test bed for designing decision algorithms used in cloud computing system. The decision algorithms are totally isolated from other components in Roystonea architecture, so the designers of the decision algorithms can focus on algorithm design without worrying about how his algorithm will interact with other Roystonea components. We believed that component pluggability will be one of the most important issues in the research of cloud computing system.


[20] Cloud computing for education and learning: Education and learning as a service (ELaaS):


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6059655&queryText%3Dcloud+computing



Cloud computing, despite its hype, is being widely deployed, with its dynamic scalability and usage of virtualized resources, in many organizations for several applications. It is envisioned that, in the near future, cloud computing will have a significant impact on the educational and learning environment, enabling their own users (i.e., learners, instructors, and administrators) to perform their tasks effectively with less cost by utilizing the available cloud-based applications offered by the cloud service providers. This paper discusses the use of cloud computing in the educational and learning arena, to be called “Education and Learning as a Service” (ELaaS), emphasizing its possible benefits and offerings. It is essential for an educational and learning organization, with its budget restrictions and sustainability challenges, to use the cloud formation best suited for a particular IT activity. The Jericho Forum proposes a cloud computing formation model, called the Cloud Cube Model (CCM), which is based on 4 criteria. To preserve the symmetry of the cube, a new cloud computing formation model, called the Complete Cloud Computing Formations (C3F), is proposed. The IT activities in the educational and learning organizations are then classified with respect to the two criteria: mission criticality and sensitivity. Each class is then mapped into the appropriate position in the C3F, creating ELaaS Quadrant. This essentially establishes a general conceptual framework for ELaaS.


[21] Can Cloud Computing Be Used for Planning? An Initial Study:

http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6133120&pageNumber%3D2%26queryText%3Dcloud+computing



Cloud computing is emerging as a prominent computing model. It provides a low-cost, highly accessible alternative to other traditional high-performance computing platforms. It also has many other benefits such as high availability, scalability, elasticity, and free of maintenance. Given these attractive features, it is very desirable if automated planning can exploit the large, affordable computational power of cloud computing. However, the latency in inter-process communication in cloud computing makes most existing parallel planning algorithms unsuitable for cloud computing. In this paper, we propose a portfolio stochastic search framework that takes advantage of and is suitable for cloud computing. We first study the running time distribution of Monte-Carlo Random Walk (MRW) search, a stochastic planning algorithm, and show that the running time distribution usually has remarkable variability. Then, we propose a portfolio search algorithm that is suitable for cloud computing, which typically has abundant computing cores but high communication latency between cores. Further, we introduce an enhanced portfolio with multiple parameter settings to improve the efficiency of the algorithm. We implement the portfolio search algorithm in both a local cloud and the Windows Azure cloud. Experimental results show that our algorithm achieves good, in many cases super linear, speedup in the cloud platforms. Moreover, our algorithm greatly reduces the running time variance of the stochastic search and improves the solution quality. We also show that our scheme is economically sensible and robust under processor failures.


[22] Adaptive Anomaly Identification by Exploring Metric Subspace in Cloud Computing Infrastructures:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6656276&pageNumber%3D2%26queryText%3Dcloud+computing


Cloud computing has become increasingly popular by obviating the need for users to own and maintain complex computing infrastructures. However, due to their inherent complexity and large scale, production cloud computing systems are prone to various runtime problems caused by hardware and software faults and environmental factors. Autonomic anomaly detection is a crucial technique for understanding emergent, cloud-wide phenomena and self-managing cloud resources for system-level dependability assurance. To detect anomalous cloud behaviors, we need to monitor the cloud execution and collect runtime cloud performance data. These data consist of values of performance metrics for different types of failures, which display different correlations with the performance metrics. In this paper, we present an adaptive anomaly identification mechanism that explores the most relevant principal components of different failure types in cloud computing infrastructures. It integrates the cloudperformance metric analysis with filtering techniques to achieve automated, efficient, and accurate anomaly identification. The proposed mechanism adapts itself by recursively learning from the newly verified detection results to refine future detections. We have implemented a prototype of the anomaly identification system and conducted experiments in an on-campus cloud computing environment and by using the Google data center traces. Our experimental results show that our mechanism can achieve more efficient and accurate anomaly detection than other existing schemes.


[23] Power management in cloud computing using green algorithm:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6215585&pageNumber%3D2%26queryText%3Dcloud+computing


The greatest environmental challenge today is global warming, which is caused by carbon emissions. Energy crisis brings green computing, and green computing needs algorithms and mechanisms to be redesigned for energy efficiency. Green IT refers to the study and practice of using computingresources in an efficient, effective and economic way. The various approaches of the green IT are Virtualization, Power Management, Material Recycling and Telecommuting. The basic principles ofcloud computing is to make the computing be assigned in a great number of distributed computers rather than local computer or remote server. In fact, cloud computing is an extend of Grid Computing, Distributed Computing and Parallel Computing. It's foreground is to provide secure, quick, convenient data storage and net computing service centered by internet. Currently, a large number of cloud computing systems waste a tremendous amount of energy and emit a considerable amount of carbon dioxide. Thus, it is necessary to significantly reduce pollution and substantially lower energy usage. The analysis of energy consumption in cloud computing consider both public and private clouds. Cloud computing with green algorithm can enable more energy-efficient use of computing power.


[24] An analysis of cloud computing security issues


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=4154555&pageNumber%3D5%26queryText%3Dautomation+system


In this study, electrical distribution automation system (DAS) at low voltage (LV) to solve the problems experienced in the presence of the power supply cut off due to the line under repair or fault. Fault detection, fault identification, fault isolation and fault clearing tasks been done using DAS solution technique. The system implemented in this project operates and controls the equipment connected at the substation and distribution line/zone/pole remotely. The equipment is divided into two types, one type is installed at the substation and the other type is located to the distribution line pole/or distribution board of the consumers. All the equipment is linked by communication line connected between the substation and the controlled zone; all equipment is controlled and operated remotely to operate and control the distribution system and to communicate each other while sitting in the control room at the sub-station.


[25] Analysis and Research of Cloud Computing System Instance


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=5431877&pageNumber%3D2%26queryText%3Dcloud+computing


As a kind of emerging business computational model, Cloud Computing distribute computation task on the resource pool which consists of massive computers, accordingly ,the application systems can gain the computation strength, the storage space and software service according to its demand. Cloud computing can be viewed from two different aspects. One is about the cloud infrastructure which is the building block for the up layer cloud application. The other is of course the cloud application. By means of three technical methods, cloud computing has achieved two important goals for the distributed computing: high scalability and high availability. Scalability means that the cloud infrastructure can be expanded to very large scale even to thousands of nodes. Availability means that the services are available even when quite a number of nodes fail. This paper discusses the evolution process of cloud computing, the current technologies adopted in cloud computing, as well as the systems in enterprises. This paper introduced with emphasis the Amazon Elastic Compute Cloud, the cloud computing platform of Google and "blue cloud" of IBM, analyze and compare three kinds of cloud computing platform.


[26] Tutorial: Secure Multiparty Computation for Cloud Computing Paradigm by Durgesh Kumar Mishra:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=5701921&pageNumber%3D2%26queryText%3Dcloud+computing


Summary form only given. Secure Multiparty Computation (SMC) allows multiple parties to perform computation on their private data to evaluate some function of their common interest. In this paradigm the individual data should be kept secret from other parties and the result of the computation should be available to all the parties. This subject of information security has created enormous interest among researchers. Many SMC models were devised and analyzed. The subject is becoming more relevant in this scenario of huge online transactions on the Internet. Many solutions, from earlier Millionaires Problem to recent Anonymity based computation on encrypted data are available in the literature. Cloud Computing is a paradigm shift from the distributed computing where an organization uses resources as service. This is a sort of "utility computing" where you pay-as-you-go like electricity bill. Cloud providers are the companies which manage large datacenters and have expertise of operating these datacenters. Cloud users are the organizations which use services from providers. Cloud users need not to deploy computing resources at their site. These resources are available from the cloud providers on utility basis and charged on usage basis. Thus an organization can improve efficiency while minimizing the expenditure and the operation overhead. They can focus on their core competencies. In this paradigm users send their data to the provider for computation and the result is provided by the provider. Many companies like Amazon, Google, IBM etc. are already in the market working as the cloud provider. As the services are gaining more popularity, concerns regarding the privacy of these data are also arising. They users of the cloud are worrying about the privacy of their data that has been supplied to the cloud provider. The solutions to these problems can be provided by the protocols of the SMC. In this tutorial, we propose SMC solution techniques that can be embedded while - designing architecture of cloud computing especially when multiple cloud providers or multiple cloud users jointly compute some function of their private data inputs. Each of the users or providers of the cloud is worried about the privacy of the individual data but due to the mutual interest all of them want to know the value of the common function. With our experience of developing protocols and devising algorithms for various SMC problems we anticipate a crucial role of SMC in cloud computing. For example consider a case where multiple cloud users jointly work on a project and utilize the services of the same cloud provider. All of them want to simultaneously evaluate their equations without revealing individual equations to one another. In such scenarios the SMC solutions can be highly useful to provide privacy. In this tutorial, we explore such scenarios while discussing various protocols of SMC and their applicability in cloud computing.


[27] Security threats and solutions in cloud computing:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6751034&pageNumber%3D2%26queryText%3Dcloud+computing


Information Technology infrastructure continues to grow with evolving technology. The invention of the Internet has increased the use of computer and the mobile device. Nowadays, many people in the world use these devices. As a result, a large amount of data stored device and each device in the Internet were required to be connected each other because of sharing information. New business model has emerged with the increase of data and the development of Internet and mobile technology. This new business model is referred to as cloud computing. The cloud computing offers many advantages, but there are also many disadvantages. The advantages are flexibility and scalability and better security and large enterprises. This paper identifies security threats focused on cloud computing which is an essential part of the companies that want to use cloud computing services. The fundamental risk factors particular the cloud are elaborated. Finally, this paper provides some solutions about security threats for enterprise and service provider for the cloud computing deployment in order to provide the security of information. This paper does not mention new idea or innovation about cloud computing. Purpose of this study is intended to be a guide for people who is interested in cloud computing and want to take advantage of the cloud computing services.


[28]Architecture and Key Issues of IMS-Based Cloud Computing:



http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6676750&pageNumber%3D2%26queryText%3Dcloud+computing


Cloud computing is changing the way of developing, deploying and managing applications. However, as typical Internet-based applications, cloud computing services lack carrier-grade signaling control mechanism and cannot guaranty Quality of Service (QoS), which have actually become technical barriers for telecom operator to provide commercial public cloud services. On the other hand, as the core signaling architecture of Next Generation Networking (NGN), IP Multimedia Subsystem (IMS) is facing the problem of the lack of innovative value-added services. This paper presents an architecture to support cloud computing services over IMS. In the proposed architecture, cloud services are regarded as the general IMS applications and then cloud clients are allowed to access cloud services under the control of Session Initiation Protocol (SIP) signaling and QoS mechanism of IMS. This paper introduces architecture overview and cloud service relevant functional components, and mainly discusses several key issues including cloud notification mechanism, QoS and charging control of IMS-based cloud computing services.


[29] STAR: A proposed architecture for cloud computing applications:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6489596&pageNumber%3D5%26queryText%3Dautomation+system


With rapid development of cloud computing, the need for an architecture to follow in developing cloud computing applications is necessary. Existing architectures lack the way cloud applications are developed. They focus on clouds' structure and how to use clouds as a tool in developing cloud computing applications rather than focusing on how applications themselves are developed using clouds. This paper presents a survey on key cloud computing concepts, definitions, characteristics, development phases, and architectures. Also, it proposes and describes a novel architecture, which aid developers to develop cloud computing applications in a systematic way. It discusses how cloud computing transforms the way applications are developed/delivered and describes the architectural considerations that developers must take when adopting and using cloud computing technology.


[30] Cloud computing and security measure:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6745284&pageNumber%3D2%26queryText%3Dcloud+computing


This paper presents the design and implementation of a Java-based automation system that can monitor and control home appliances via the World Wide Web. The design is based on a stand alone embedded system board integrated into a PC-based server at home. The home appliances are connected to the input/output ports of the embedded system board and their status are passed to the server. The monitoring and control software engine is based on the combination of JavaServer pages, JavaBeans, and interactive C. The home appliances can be monitored and controlled locally via the embedded system board, or remotely through a Web browser from anywhere in the world provided that an Internet access is available. The system is scalable and allows multi-vendor appliances to be added with no major changes to its core. Password protection is used to block unauthorized users from accessing the appliances at home. If the Internet connection is down or the server is not up, the embedded system board still can control and operate the appliances locally.


[31] GreenCloud for Simulating QoS-Based NaaS in Cloud Computing:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6746535&pageNumber%3D2%26queryText%3Dcloud+computing


Cloud computing that was introduced when local facilities could not any more satisfy access demands along with the increase of network bandwidth and diversity of services, breaks constraints of physical deployment and delivers varieties of services in its hardware/software virtualized manner. Being inherited the idea, the NaaS as a new presented research field ever since the cloud computing being introduced, delivers network itself as a kind of service under such circumstances. By its concept, the network utilization will no longer be restricted by physical network or local facilities, but is able to expropriate any network resources within the cloud once they are virtualization organized. Green Cloud simulation as one of the NS-2 cloud computing simulators, implements an energy-aware cloud computing scenario with infrastructures (switches, routers, links, etc.) virtualized in data center. In this paper, we discusses the Network as a Service (NaaS), a cloud architecture that delivers virtualized network as per demands from cloud user, with illustration of QoS-based Green Cloud simulation, that to present the behavior and performance of NaaS in cloud computing environment.


[32] Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6141247&pageNumber%3D2%26queryText%3Dcloud+computing


Cloud computing has changed the whole picture that distributed computing used to present e.g. Grid computing, server client computing. Cloud has given a new meaning to distributed, and off-premises computing. Although, Cloud offers great benefits, it also introduces a myriad of security threats to the information and data which is now being ported from on-premises to off-premises. Where cloud computing can help organizations accomplish more by paying less (in the longer run) and breaking the physical boundaries between IT infrastructure and its users, due to openness of accessible information and data relying on trust between cloud provider and customer, heightened security threats must be overcome in order to benefit fully from this new computing exemplar. Breach in the security of any component in the cloud can be both disaster for the organization (the customer) and defacing for the provider. This paper explores the security issues related to the cloud. The paper also discusses the existing security approaches to secure the cloud infrastructure and applications and their drawbacks. Finally, we explore some key research challenges of implementing new cloud-aware security solutions that can provide the likes of pre-emptive protection for complex and ever dynamic Cloud infrastructure, followed by conclusion where we try to entail the whole research and try to formulate a security strategy which will enable the Cloud providers and customers alike to fight against ever emerging security threats.


[33] Integrating ZigBee lighting control into existing building automation systems:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6767183&pageNumber%3D2%26queryText%3Dcloud+computing


Cloud computing technology which is next-generation architecture has created hype in IT and business world promising to deliver wide range of benefits. Gartner estimated that cloud market will surpass $148.8 billion by 2014. Despite the fact cloud computing technology remains for many an unfamiliar concept. Therefore, if cloud computing technology is to achieve its potential then there is need to have a clear understanding of various factors associated with its adoption by business. Cloud computing technology has already started impacting businesses and penetrated many areas from banks, automobile sector, education, logistics, wholesale, retail and health care. It is also emerging as a major enablers for the manufacturing industry that can transform the traditional business model, help it with product innovation with business strategy and create effective factory networks with collaboration. Adoption of cloud computing technology in supply chains of manufacturing industry will also improve performance in the form of better information visibility, cost reduction, and improved agility. For IS researchers, this study will outline factors associated with adaption of cloud computing technology in supply chains of manufacturing industry so that they will be in a position to advise the industry in the years to come. The paper will start by general introduction with an overview about cloud computing. Then, it will summarize the literature work that has been done so far with advantages of cloud computing technology. In next section, the theoretical framework will be described. Finally, the paper will close with a conclusion .


[34] An Investigation of the Effect of Cloud Computing on Network Management


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=5431874&pageNumber%3D2%26queryText%3Dcloud+computing


Cloud computing is one of the fascinating advancements in the computing technology. With its fashionable features, cloud deployment is well spread in a wide range of applications. Managing the cloud environment is a complex process because of the virtual nature of the cloud. Cloud management is different from the conventional network management in many aspects. This paper summarizes the functionalities and the importance of network management and reveals the effect of cloud computing over the conventional network management. The five functional areas defined by ISO for network management are mainly concentrated: fault, configuration, accounting, performance and security. Some of the issues faced by cloud computing and their effect in cloud performance have been discussed. Some principles for the network management to support cloud computing and to solve the issues of cloud computing are also suggested. As an important outcome of this academic work, the effects and impacts of cloud computing over network management policies have been delivered to a reasonable depth.


[35] Cloud Computing Research and Development Trend


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=5431874&pageNumber%3D2%26queryText%3Dcloud+computing

With the development of parallel computing, distributed computing, grid computing, a new computing model appeared. The concept of computing comes from grid, public computing and SaaS. It is a new method that shares basic framework. The basic principles of cloud computing is to make the computing be assigned in a great number of distributed computers, rather then local computer or remoter server. The running of the enterprise's data center is just like Internet. This makes the enterprise use the resource in the application that is needed, and access computer and storage system according to the requirement. This article introduces the background and principle of cloud computing, the character, style and actuality. This article also introduces the application field the merit of cloud computing, such as, it do not need user's high level equipment, so it reduces the user's cost. It provides secure and dependable data storage center, so user needn't do the awful things such storing data and killing virus, this kind of task can be done by professionals. It can realize data share through different equipments. It analyses some questions and hidden troubles, and puts forward some solutions, and discusses the future of cloud computing. Cloud computing is a computing style that provide power referenced with IT as a service. Users can enjoy the service even he knows nothing about the technology of cloud computing and the professional knowledge in this field and the power to control it.



[36] Design and Implementation of Hybrid Cloud Computing Architecture Based on Cloud Bus


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6726345&pageNumber%3D2%26queryText%3Dcloud+computing


A new model of hybrid cloud computing architecture based on cloud bus is proposed. The system is based on local private cloud, combined with one or more type(s) of public cloud(s). The internal structures of private cloud and public cloud are the same, including infrastructure and virtualization layer, cloud platforms layer, cloud bus layer, cloud application layer, the management center and storage centers. The layer of infrastructure and virtualization is designed to incorporate the underlying hardware resources into a virtual cluster, providing a variety of virtual resources to the upper layer. The layer of cloud platform is used to run Web applications or services, and carry application-specific development and application integration through its open interfaces. The cloud bus layer, consisting of a control bus, a number of node buses and adapters, is designed to manage and monitor the various services of the cloud platform layer. The proposed model of the architecture can accelerate the migration of the existing IT environments to cloud computing environments, reduce the investment, and make full use of IT resources.


[37] The Current State of Understanding of the Energy Efficiency of Cloud Computing:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6296228&pageNumber%3D2%26queryText%3Dcloud+computing


Cloud computing has been hailed as the achievement of the long-held dream of computing as a utility and has the potential to transform a large part of the Information and Communication Technology (ICT) industry. Cloud computing is both a business and an economic model which has been gaining popularity since 2006 and it is currently the most talked about technology in the ICT industry. Because it views hardware and software as commodities, the cloud is an example of a disruptive technology. It offers enterprises the opportunity to reduce hardware and software cost and the potential reduction of maintenance and support staff. Data centers and cloud computing services providers hope that the widespread adoption of the cloud will bring them more profit and they are actively promoting the technology. The cloud has had its share of controversy; ranging from the definition of cloud computing to its energy efficiency. This paper discusses one area of controversy; the energy efficiency of cloud computing. We outline previous contributions to the discussion of energy efficiency of cloud computing, provide a working definition of cloud computing and discuss its importance, which will grow as the technology matures and becomes well known.


[38] An efficient and secured data storage scheme in cloud computing using ECC-based PKI:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6779015&pageNumber%3D2%26queryText%3Dcloud+computing


Cloud computing is set of resources and services offered through the Internet. Cloud services are delivered from data centres located throughout the world. Cloud computing facilitates its consumers by providing virtual resources via internet. The rapid growth in field of "cloud computing" also increases severe security concerns. Security has remained a constant issue for Open Systems and internet, when we are talking about security, cloud really suffers. Lack of security is the only hurdle in wide adoption of cloud computing. Cloud computing is surrounded by many security issues like securing data and examining the utilization of cloud by the cloud computing vendors. This paper proposes a scheme to securely store and access of data via internet. We have used ECC based PKI for certificate procedure because the use of ECC significantly reduces the computation cost, message size and transmission overhead over RSA based PKI as 160-bit key size in ECC provides comparable security with 1024-bit key in RSA. We have designed Secured Cloud Storage Framework (SCSF). In this framework, users not only can securely store and access data in cloud but also can share data with multiple users through the unsecure internet in a secured way. This scheme can ensure the security and privacy of the data in the cloud..


[39] The security of cloud computing system enabled by trusted computing technology:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=5555234&pageNumber%3D2%26queryText%3Dcloud+computing


Cloud computing provides people the way to share distributed resources and services that belong to different organizations or sites. Since cloud computing share distributed resources via the network in the open environment, thus it makes security problems important for us to develop the cloud computing application. In this paper, we pay attention to the security requirements in cloud computing environment. We proposed a method to build a trusted computing environment for cloud computing system by integrating the trusted computing platform into cloud computing system. We propose a model system in which cloud computing system is combined with trusted computing platform with trusted platform module. In this model, some important security services, including authentication, confidentiality and integrity, are provided in cloud computing system.


[40] The comparison between cloud computing and grid computing:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=5623257&pageNumber%3D2%26queryText%3Dcloud+computing


It is a great idea to make many normal computers together to get a super computer, and this computer can do a lot of things. This is the concept of cloud computing. Cloud computing is an emerging model of business computing. And it is becoming a development trend. This article compares cloud computing and grid computing. Internet has connected all the computers in the world. Grid computing has been put forward under this background. Its core concept is to complete computing based on compute grid, in it every computer will devote power. In recent years a new concept cloud computing has been put forward, it can connect millions of computers to a super cloud. This article also introduces the application field the merit of cloud computing, such as, it do not need user's high level equipment, so it reduces the user's cost. It provides secure and dependable data storage center, so user needn't do the awful things such storing data and killing virus, this kind of task can be done by professionals. It can realize data share through different equipments. The users need not know how the cloud runs. In this paper I describe the concept of cloud computing and grid computing and compare them.


[41] Enhanced data security model for cloud computing:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6236556&pageNumber%3D2%26queryText%3Dcloud+computing


Cloud Computing becomes the next generation architecture of IT Enterprise. In contrast to traditional solutions, Cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique feature, however, raises many new security challenges which have not been well understood. In cloud computing, both data and software are fully not contained on the user's computer; Data Security concerns arising because both user data and program are residing in Provider Premises. Clouds typically have a single security architecture but have many customers with different demands. Every cloud provider solves this problem by encrypting the data by using encryption algorithms. This paper investigates the basic problem of cloud computing data security. We present the data security model of cloud computing based on the study of the cloud architecture. We improve data security model for cloud computing. We implement software to enhance work in a data security model for cloud computing. Finally apply this software in the Amazon EC2 Micro instance.


[42] Real-Time Adaptive Automation System Based on Identification of Operator Functional State in Simulated Process Control Operations:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=5345873&pageNumber%3D5%26queryText%3DAutomation+system


This paper proposes a new framework for the online monitoring and adaptive control of automation in complex and safety-critical human-machine systems using psychophysiological markers relating to humans under mental stress. The starting point of this framework relates to the assessment of the so-called operator functional state using psychophysiological measures. An adaptive fuzzy model linking heart-rate variability and task load index with the subjects' optimal performance has been elicited and validated offline via a series of experiments involving process control tasks simulated on an automation-enhanced Cabin Air Management System. The elicited model has been used as the basis for an online control system via the predictions of the system performance indicators corresponding to the operator stressful state. These indicators have been used by a fuzzy decision maker to modify the level ofautomation under which the system may operate. A real-time architecture has been developed as a platform for this approach. It has been validated in a series of human volunteer studies with promising improvement in performance.


[43] Thermal analysis automation system for semiconductor package:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=4525028&pageNumber%3D6%26queryText%3DAutomation+system


The technology of thermal analysis is very important in development of a new generation of IC package design, which aims to obtain the temperature distribution and thermal resistance of package. Most IC design engineers and package engineers have many difficulties in performing thermal analysis because they are familiar with the product structure but poor in thermal-physical modeling and FEA skills. To assist IC design engineers and package engineers to perform thermal analysis efficiently and accurately, a fully automation system (WBExcel) that has the ability to complete the whole package thermal analysis automatically has been developed based on ANSYSreg Workbench and Excel. The WBExcel consist of four modules: a Package Model Information Library, an executable Wizard System, a Package Material Library and an Environment Library. The general methodology of developing thisautomation system is introduced. The application on PCB level analysis and component level analysis is presented and indicates the reliability and efficiency of WBExce.


[44] Rhizome: A middle-ware for cloud vision computing framework:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6737832&pageNumber%3D3%26queryText%3Dcloud+computing


Over the past decade, high performance applications have embraced parallel programming and computing models, like video analysis for surveillance purpose. However due to the heterogeneous, opaque and dynamic nature of Cloud Computing, existing Cloud parallel framework like Hadoop/HPCC (with Job-keeper + Map-reduce behind) approach is not suitable to perform vision computing specific task on the cloud. Rhizome is a middle-ware as PAAS & IASS for building specific cloud vision computing applications, so as to convert a high performance application to an elastic cloud one, which may enable effective high performance and robust parallel computing especially for streaming like task e.g. vision computing within the cloud environment. Rhizome encourages use of simple MoC based concurrency patterns that are easy to understand and implement correctly, and built on an agency-like model with declarative specification of persistence, replication, and consistency and using lightweight transactions in cloud OS environment to support the development of reliable and scalable client + cloud software. The experimental assessment demonstrates a superior performance of the cloud vision computing application in Hadoop with the help of Rhizome, which provides substantial and consistent better programming easiness and system robustness.


[45] A survey on cloud computing resource allocation techniques:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6780076&pageNumber%3D3%26queryText%3Dcloud+computing


Cloud Computing is a type of computing which can be considered as a new era of computing. Cloud can be considered as a rapidly emerging new paradigm for delivering computing as a utility. In cloud computing various cloud consumers demand variety of services as per their dynamically changing needs. So it is the job of cloud computing to avail all the demanded services to the cloud consumers. But due to the availability of finite resources it is very difficult for cloud providers to provide all the demanded services. From the cloud providers' perspective cloud resources must be allocated in a fair manner. So, it's a vital issue to meet cloud consumers' QoS requirements and satisfaction. This paper mainly addresses key performance issues, challenges and techniques for resource allocation in cloud computing. It also focuses on the key issues related to these existing resource allocation techniques and summarizes them.


[46] The Characteristics of Cloud Computing:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=5599083&pageNumber%3D3%26queryText%3Dcloud+computing


Cloud computing emerges as one of the hottest topic in field of information technology. Cloud computing is based on several other computing research areas such as HPC, virtualization, utility computing and grid computing. In order to make clear the essential of cloud computing, we propose the characteristics of this area which make cloud computing being cloud computing and distinguish it from other research areas. The cloud computing has its own conceptional, technical, economic and user experience characteristics. The service oriented, loose coupling, strong fault tolerant, business model and ease use are main characteristics of cloud computing. Clear insights into cloud computing will help the development and adoption of this evolving technology both for academe and industry.


[47] Verification Requirements for Secure and Reliable Cloud Computing:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6686021&pageNumber%3D3%26queryText%3Dcloud+computing


Cloud computing has been widely adopted in a large variety of applications. This brings besides others also many new challenges in the fields of security and reliability. Like any other security and correctness sensitive computer system, it is beneficial to fully verify cloud solutions to ensure their correctness. Verification and validation of distributed systems has been widely studied, however, it has not been analyzed whether verification approaches in distributed systems can be directly applied to cloud computing or not. In this study, we present a comparison of verification requirements for distributed computing and cloud computing to establish the need of a specialized verification model/architecture for cloud computing. We differentiate the verification in distributed and cloud systems based on their business models, architecture models, programming models and security models. We argue that service level agreements (SLAs), which span across the cloud, become more critical in the verification process. Based on our study, we present an abstract verification model focusing specifically on cloud computing, paving the way to an implementation of a viable verification model which can practically verify complex cloud systems.


[48] Cloud computing for future generation of computing technology:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6392539&pageNumber%3D3%26queryText%3Dcloud+computing


The emergence of cloud computing, envisioned as the future generation of computing model for its major advantages in on-demand self-service, ubiquitous network access, location independent resource pooling and transference of risk, has established a trend towards building massive, energy-hungry and geographically distributed data centers. It is the latest developments of computing models after distributed computing, parallel processing and grid computing. It achieves multi-level virtualization and abstraction through effective integration of variety of computing, storage, data, applications and other resources, users can be easy to use powerful computing and storage capacity of cloud computing only need to connect to the network. It can also concentrate all computation resources and manage automatically through the software without intervene. In this paper, we highlight the different aspects of cloud computing for finding the actuality of the future generation of commuting in the form of cloud computing after mainframe based computing, personal computing, client server based computing and web server based computing.


[49] Capturing Cloud Computing Knowledge and Experience in Patterns:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6253572&pageNumber%3D3%26queryText%3Dcloud+computing


The industry-driven evolution of cloud computing tends to obfuscate the common underlying architectural concepts of cloud offerings and their implications on hosted applications. Patterns are one way to document such architectural principles and to make good solutions to reoccurring (architectural) cloud challenges reusable. To capture cloud computing best practice from existing cloud applications and provider-specific documentation, we propose to use an elaborated pattern format enabling abstraction of concepts and reusability of knowledge in various use cases. We present a detailed step-by-step pattern identification process supported by a pattern authoring toolkit. We continuously apply this process to identify a large set of cloud patterns. In this paper, we introduce two new cloud patterns we identified in industrial scenarios recently. The approach aims at cloud architects, developers, and researchers alike to also apply this pattern identification process to create traceable and well-structured pieces of knowledge in their individual field of expertise. As entry point, we recap challenges introduced by cloud computing in various domains.


[50] A survey and analysis of cloud model-based security for computing secure cloud bursting and aggregation in renal environment:


http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6141288&pageNumber%3D3%26queryText%3Dcloud+computing


Cloud Computing has emerged as a major information and communications technology trend and has been proved as a key technology for market development and analysis for the users of several field. The practice of computing across two or more data centers separated by the Internet is growing in popularity due to an explosion in scalable computing demands. However, one of the major challenges that faces the cloud computing is how to secure and protect the data and processes the data of the user. The security of the cloud computing environment is a new research area requiring further development by both the academic and industrial research associations. While cloud-bursting is addressing this process of scaling up and down across data centers. To provide secure and reliable services in cloud computing environment is an important issue. One of the security issues is how to reduce the impact of denial-of-service (DoS) attack or distributed denial-of-service (DDoS)in this environment. In this paper we survey several aspects of cloud computing and the security concerns and proposed a novel approach that is Cloud Bursting Brokerage and Aggregation (CBBA). In this approach we consider three clouds for bursting and aggregation operation. We also used secure sharing mechanism so that the cloud resources are shared among different cloud environment.


More About Android Application


What is cloud computing? Everyone is talking about “the cloud.” But what does it mean? Business applications are moving to the cloud. It’s not just a fad—the shift from traditional software models to the Internet has steadily gained momentum over the last 10 years. Looking ahead, the next decade of cloud computing promises new ways to collaborate everywhere, through mobile devices. Life before cloud computing Traditional business applications have always been very complicated and expensive. The amount and variety of hardware and software required to run them are daunting. You need a whole team of experts to install, configure, test, run, secure, and update them.When you multiply this effort across dozens or hundreds of apps, it’s easy to see why the biggest companies with the best IT departments aren’t getting the apps they need. Small and mid-sized businesses don’t stand a chance. Cloud computing: a better way With cloud computing, you eliminate those headaches because you’re not managing hardware and software—that’s the responsibility of an experienced vendor like salesforce.com. The shared infrastructure means it works like a utility: You only pay for what you need, upgrades are automatic, and scaling up or down is easy.Cloud-based apps can be up and running in days or weeks, and they cost less. With a cloud app, you just open a browser, log in, customize the app, and start using it. Businesses are running all kinds of apps in the cloud, like customer relationship management (CRM), HR, accounting, and much more. Some of the world’s largest companies moved their applications to the cloud with salesforce.com after rigorously testing the security and reliability of our infrastructure.As cloud computing grows in popularity, thousands of companies are simply rebranding their non-cloud products and services as “cloud computing.” Always dig deeper when evaluating cloud offerings and keep in mind that if you have to buy and manage hardware and software, what you’re looking at isn’t really cloud computing but a false cloud. Cloud 2: Mobility and collaboration The latest innovations in cloud computing are making our business applications even more mobile and collaborative, similar to popular consumer apps like Facebook and Twitter. As consumers, we now expect that the information we care about will be pushed to us in real time, and business applications in the cloud are heading in that direction as well. With Cloud 2, keeping up with your work is as easy as keeping up with your personal life on Facebook. Definition of 'Cloud Computing' A model for delivering information technology services in which resources are retrieved from the internet through web-based tools and applications, rather than a direct connection to a server. Data and software packages are stored in servers. However, cloud computing structure allows access to information as long as an electronic device has access to the web. This type of system allows employees to work remotely. Cloud computing is so named because the information being accessed is found in the "clouds", and does not require a user to be in a specific place to gain access to it. Companies may find that cloud computing allows them to reduce the cost of information management, since they are not required to own their own servers and can use capacity leased from third parties. Additionally, the cloud-like structure allows companies to upgrade software more quickly.As cloud services mature and add features, they increasingly overlap, signaling heightened competition in both the consumer and enterprise markets. Smaller cloud players must be nimble and adaptive to avoid getting trampled.The cloud is the latest battleground of the tech titans across the spectrum of enterprise and consumer business, but maturation, a desire for market hegemony and technology evolution naturally lead to new features and that means formerly disparate services are encroaching upon one another. Cloud services are the latest realm in the technology industry’s quest to build compelling, defensible and sticky ecosystems. As such, the dominant tech giants will continue to expand their reach and further intrude on each other’s turf in both the enterprise and consumer markets. The jostling will create plenty of news and be fun to watch, but smaller cloud players must be nimble and adaptive to avoid getting trampled.Cloud computing is Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand, as with the electricity grid.Cloud computing is a natural evolution of the widespread adoption of virtualization, Service-oriented architecture and utility computing. Details are abstracted from consumers, who no longer have need for expertise in, or control over, the technology infrastructure "in the cloud" that supports them. Cloud computing describes a new supplement, consumption, and delivery model for IT services based on the Internet, and it typically involves over-the-Internet provision of dynamically scalable and often virtualized resources. It is a byproduct and consequence of the ease-of-access to remote computing sites provided by the Internet. This frequently takes the form of web-based tools or applications that users can access and use through a web browser as if it were a program installed locally .



KaaShiv InfoTech offers world class Final Year Project for BE, ME, MCA ,MTech, Software engineering and other students in Anna Nagar, Chennai.

internship in chennai



Website Details:


Inplant Training:


http://inplant-training.org/
http://www.inplanttrainingchennai.com/
http://http://inplanttraining-in-chennai.com/

Internship:


http://www.internshipinchennai.in/
http://www.kernelmind.com/
http://www.kaashivinfotech.com/