For Inplant/Internship training Request, Please Download the Registration Form, Please fill the details and send back the same to kaashiv.info@gmail.com

Cloud Enviroment

KaaShiv InfoTech, Number 1 Inplant Training Experts in Chennai.

Description:


There are several potential blessings to Associate in Nursing all cloud atmosphere, together with the power to access all of your work, programs and different info from any device. However, Associate in Nursing all cloud atmosphere remains a comparatively new conception and there are several nonreciprocal queries, like what happens if a cloud supplier goes down or out of business. over doubtless, the primary users to enter Associate in Nursing all-cloud atmosphere are people, as businesses have a lot of proprietary information to fret concerning.Running applications from the net or a personal cloud network solely and not running any applications put in within the user's pc.


kaashiv infotech

Algorithm:


  • AES Algorithm
  • Dsa algorithm
  • Blowfish and RSA algorithm
  • ciper cloud Algorithm
  • Eclipse ide algorithm
  • Equally spread curent Excution Algorithm
  • Round Robin Algorithm
  • Throtled Algorithm
  • Join-the-shortest-queue routing Algorithm
  • Power-of-two-choices routing Algorithm
  • MaxWeight Scheduling Algorithm
  • Seceret sharing Algorithm

  • Security Based Cloud Enviroment:


    Usability Matrix on Dynamic datasets for Cloud Storage Solution Framework


    Abstract:


    Cloud Enviroment is one of the most pre-dominant paradigm in recent trends for computing and storing purposes. The end of this decade is marked with a predominant change in the industrial information technology towards a pay-per-use service business model which provides an optimistic approach for the end users on the software's and storage. Going ahead with many advantages in the computing world and storage resources offered by cloud service providers, the data owners must place their valuable information into the public cloud servers which are not within their trusted domains. Data security and privacy of data is one of the major concern in the cloud enviroment. To overcome this situation of information disclosure, the service providers are enforcing a particular standard of encrypting the sensitive data before uploading onto the cloud servers. It become obvious that, the plain text keyword search is impossible. As the total amount of data stored in public clouds increases in an exponential manner, it becomes too hard to support efficient keyword based queries and ranking the matching results on encrypted data.


    IEEE Title:


    Load Rebalancing for Distributed File Systems in Clouds Hung-.


    IEEE Abstract:


    Distributed file systems are key building blocks for cloud enviroment applications based on the MapReduce programming paradigm. In such file systems, nodes simultaneously serve computing and storage functions; a file is partitioned into a number of chunks allocated in distinct nodes so that MapReduce tasks can be performed in parallel over the nodes. However, in a cloud enviroment environment, failure is the norm, and nodes may be upgraded, replaced, and added in the system. Files can also be dynamically created, deleted, and appended. This results in load imbalance in a distributed file system; that is, the file chunks are not distributed as uniformly as possible among the nodes. Emerging distributed file systems in production systems strongly depend on a central node for chunk reallocation. This dependence is clearly inadequate in a large-scale, failure-prone environment because the central load balancer is put under considerable workload that is linearly scaled with the system size, and may thus become the performance bottleneck and the single point of failure. In this paper, a fully distributed load rebalancing algorithm is presented to cope with the load imbalance problem. Our algorithm is compared against a centralized approach in a production system and a competing distributed solution presented in the literature. The simulation results indicate that our proposal is comparable with the existing centralized approach and considerably outperforms the prior distributed algorithm in terms of load imbalance factor, movement cost, and algorithmic overhead. The performance of our proposal implemented in the Hadoop distributed file system is further investigated in a cluster environment.


    Implementation:



    kaashiv infotech

    Data Staging in cloud enviroment:


    Secure Data Staging Management in Cost Effective Cloud Environment


    Abstract:


    An emerging computing paradigm, the CLOUD is a perfect computing infrastructure providing best services over the Internet with many new challenges. Data intensive processes utilize and generate huge amounts of data. Variety of technological Strategies were employed to stage data in and out to compute the processes and manipulate the resources which may have a significant impact on the overall execution of a workflow process. Ensuring data security leads to high storage, computational and distribution cost. Hence an optimal solution strategy is involved to make data available at on request at the right time and right place with traditionally very low cost. Our goal is to achieve perfect data sharing for single/ multiple data source with single/ multiple data copies along with minimal cost, perfect bandwidth and network utilization with maximized data availability in the cloud environment. The existing system deals on the dynamic programming (DP) techniques to optimally migrate, replicate, and cache the shared information’s from the cloud systems. Main considerations towards resource constraints in an efficient way while minimizing the monetary cost for transmitting and caching the data items is the core focus. Two environmental ways of manipulating or calculating the cost is done, One is towards the homogenous model and the other one is heterogeneous model. Research didn’t focus mainly on the security part of the system in which the extracting the copy of the document or data and providing the same from the vantage servers will provide a major flaw in the security zone. To overcome this issue, we are trying to provide a homomorphic token among the peers and it’s authorized by the cloud servers.


    IEEE Tittle: On Data Staging Algorithms for Shared Data Accesses in Clouds


    IEEE Abstract:


    In this paper, we study the strategies for efficiently achieving data staging and caching on a set of vantage sites in a cloud system with a minimum cost. Unlike the traditional research, we do not intend to identify the access patterns to facilitate the future requests. Instead, with such a kind of information presumably known in advance, our goal is to efficiently stage the shared data items to predetermined sites at advocated time instants to align with the patterns while minimizing the monetary costs for caching and transmitting the requested data items. To this end, we follow the cost and network models in [1] and extend the analysis to multiple data items, each with single or multiple copies. Our results show that under homogeneous cost model, when the ratio of transmission cost and caching cost is low, a single copy of each data item can efficiently serve all the user requests. While in multicopy situation, we also consider the tradeoff between the transmission cost and caching cost by controlling the upper bounds of transmissions and copies. The upper bound can be given either on per-item basis or on all-item basis. We present efficient optimal solutions based on dynamic programming techniques to all these cases provided that the upper bound is polynomially bounded by the number of service requests and the number of distinct data items. In addition to the homogeneous cost model, we also briefly discuss this problem under a heterogeneous cost model with some simple yet practical restrictions and present a 2-approximation algorithm to the general case.We validate our findings by implementing a data staging solver, whereby conducting extensive simulation studies on the behaviors of the algorithms.


    implementation:

    kaashiv infotech

    Policy Management in cloud enviroment:


    Flexible policy and secure key based administration using cloud storage


    Abstract:


    In an organization perspective, Large scale cloud applications involves more number of users accessing the application. Denial of unauthorized user access into the system should be more cautious. Most of the social networks and mobile applications in today’s world define very flexible policies to be stored in the cloud, to provide vast reach to users. This allows hackers to intrude such data’s and access user’s private information. This increases the need of a strong policy for a social network / mobile application, accessed by world wide users. Our proposed approach verifies and analyzes existing similar applications and arrives at new policies by collaborating with the previous one already present in the cloud server, to enforce security to the applications. The existing category based method fetches limited number of similar policies since it matches the already existing policies only according to the category. The proposed text mining methodology proves to be effective and efficient for fetching out similar policies from the repository. it matches all similar policy based on the text of already present policies from the repository. The multi handling methodology with key generation technique acts as an independent methodology to provide an effective and secure policy for application administration.


    IEEE Title


    A UCONABC Resilient Authorization Evaluation for cloud enviroment


    IEEE Abstract:


    The Business-driven access control used in cloud enviroment is not well suited for tracking fine-grained user service consumption. UCONABC applies continuous authorization reevaluation, which requires usage accounting that enables finegrained access control for cloud enviroment. However, it was not designed to work in distributed and dynamic authorization environments like those required in cloud enviroment. During a continuous (periodical) reevaluation an authorization exception condition – disparity among usage accounting and authorization attributes – may occur. This proposal aims to provide resilience to the UCONABC continuous authorization reevaluation, by dealing with individual exception conditions while maintaining a suitable access control in the cloud environment. The experiments made with a proof-of-concept prototype show a set of measurements for an application scenario (e-commerce) and allows for the identification of exception conditions in the authorization reevaluation.


    Implementation:


    kaashiv infotech

    Screenshot:


    kaashiv infotech

    Secure and Dynamic Group Authorization in cloud enviroment:


    Secure and Dynamic Group Authorization On Versionized Document Repository in Cloud Environment


    Abstract:


    Information sharing is the key goal of Cloud Storage servers. It allows storage of sensitive and large volume of data with limited cost and high access benefits. Security must be in given due importance for the cloud data with utmost care to the data and confidence to the data owner. Existing system stores sensitive data in an untrusted way sharing only the access key across the network. Even though this methodology provides better security, it involves complex communication strategies. Also revocation of defined policies / users is impossible in the current systems. Our proposed solution provides a better way to control the user information by network manager and also allows new users to follow the predefined policy implemented on the cloud storage. This methodology provides better way to organize data among a dynamic multi-user environment maintaining security and privacy of data as well as users. The system also includes Dynamic Proposal for Broadcasting and group signature scheme to sign messages in a private way and also allows to share encrypted data across the network in a secure way.


    IEEE Title


    Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud


    IEEE Abstract:


    With the character of low maintenance, cloud enviroment provides an economical and efficient solution for sharing group resource among cloud users. Unfortunately, sharing data in a multi-owner manner while preserving data and identity privacy from an untrusted cloud is still a challenging issue, due to the frequent change of the membership. In this paper, we propose a secure multiowner data sharing scheme, named Mona, for dynamic groups in the cloud. By leveraging group signature and dynamic broadcast encryption techniques, any cloud user can anonymously share data with others. Meanwhile, the storage overhead and encryption computation cost of our scheme are independent with the number of revoked users. In addition, we analyze the security of our scheme with rigorous proofs, and demonstrate the efficiency of our scheme in experiments.


    Implementation:


    kaashiv infotech

    ScreenShot:


    kaashiv infotech


    Decryption Outsourcing in cloud enviroment:


    HealthCare Monitoring Solution with Decryption Outsourcing in Parallel Computing Cloud


    Abstract:


    Mobile devices has reached a wide development range and hence proves its assistance in health care in combination with Cloud Servers. The existing cloud-assisted mHealth monitoring offers various services such as monitoring of physiological data through remote sensors, suggesting physical exercise required for the body as well as medical consultataion. These are achieved in collaboration with Cloud Servers providing Software as a service (SaaS), thus providing healthcare solutions at low cost. But there is a high risk of security breach of patient’s private data as there is a lack of data management. Our proposed approach Cloud-Assisted m-Health monitor identifies the existing system’s design problems and proposes private key proxy re-encryption scheme that helps in reduction of computation complexity of securing data. The Third party collaborator of the healthcare company is then responsible for private key distribution to clients which can be used for querying his data. When the user requires to access his data, he passes the private key and the healthcare company index to the collaborator, who in turn inputs the master key to the cloud. The user finally receives a private key to pass to the cloud in the encryption form , which then provides back the user with decrypted data. Hence the cloud has no reach to unencrypted private data of the user. Also the advantage of this CAM model is that it drastically reduces workload of encryption/decryption tasks by outsourcing them to the cloud server.


    IEEE Title


    CAM: Cloud-Assisted Privacy reserving Mobile Health Monitoring


    IEEE Abstract:


    Cloud-assisted mobile health (mHealth) monitoring, which applies the prevailing mobile communications and cloud enviroment technologies to provide feedback decision support, has been considered as a revolutionary approach to improving the quality of healthcare service while lowering the healthcare cost. Unfortunately, it also poses a serious risk on both clients’ privacy and intellectual property of monitoring service providers, which could deter the wide adoption of mHealth technology. This paper is to address this important problem and design a cloud-assisted privacy preserving mobile health monitoring system to protect the privacy of the involved parties and their data. Moreover, the outsourcing decryption technique and a newly proposed key private proxy reencryption are adapted to shift the computational complexity of the involved parties to the cloud without compromising clients’ privacy and service providers’ intellectual property. Finally, our security and performance analysis demonstrates the effectiveness of our proposed design.



    Log Maintenance in cloud enviroment :


    Active inspection Services with log maintenance scheme for cloud storage


    Abstract:


    cloud enviroment is an emerging technology in this computer science field that provides an ambiance for processing data or services for application on demand. Cloud storage is more prominent as it is oblige and reduce the hinder in storage management. But it should also be against vulnerabilities so as to safeguard the data. In the existing system, an audit service has been utilized so as to trace out the data for enhancing security in the cloud storage. Tag creation, periodic sampling and dynamic data operation were concentrated in the audit service of the existing system in order to trace out the data for security concern. In proposed system, a log based audit service that monitors the privileged data utilizer, their time period of utilization has been considered so as to trace out the data in the cloud storage.


    IEEE Title


    Dynamic Audit Services for Outsourced Storages in Clouds:


    IEEE Abstract:


    In this paper, we propose a dynamic audit service for verifying the integrity of an untrusted and outsourced storage. Our audit service is constructed based on the techniques, fragment structure, random sampling, and index-hash table, supporting provable updates to outsourced data and timely anomaly detection. In addition, we propose a method based on probabilistic query and periodic verification for improving the performance of audit services. Our experimental results not only validate the effectiveness of our approaches, but also show our audit system verifies the integrity with lower computation overhead and requiring less extra storage for audit metadata.


    Secure Encryption and Decryption in cloud enviroment :


    Element based secure encryption and decryption paradigm


    Abstract:


    Abstract: Issues related to sharing information in a distributed system is one of the major practical issue consisting of autonomous entities which needs to be securely transferred in a heterogeneous multi subdivided systems. Hence the concepts of encryption and decryption are formulated to transfer the data from source to destination securely. By using an encryption/Decryption standard our distributed secure computation system show that our approach seamlessly integrates security enforcement at the user intensity with a certain trust level. A novel based method of verifying the correctness of the conversion from encryption to decryption are made. In the existing system, Private and public key are generated by the source organisation and proxy verifies the private key before issuing. But the existing system, attribute based master secret key are not unique at their attribute consideration. Hence a system is proposed so as to define as strategy to check the unique attribute based encryption using proxies and outsourced decryption.


    IEEE Title


    Attribute-Based Encryption With Verifiable Outsourced Decryption:


    IEEE Abstract:


    Attribute-based encryption (ABE) is a public-keybased one-to-many encryption that allows users to encrypt and decrypt data based on user attributes. A promising application of ABE is flexible access control of encrypted data stored in the cloud, using access polices and ascribed attributes associated with private keys and ciphertexts.One of themain efficiency drawbacks of the existing ABE schemes is that decryption involves expensive pairing operations and the number of such operations grows with the complexity of the access policy. Recently, Green et al. proposed an ABE system with outsourced decryption that largely eliminates the decryption overhead for users. In such a system, a user provides an untrusted server, say a cloud service provider, with a transformation key that allows the cloud to translate any ABE ciphertext satisfied by that user’s attributes or access policy into a simple ciphertext, and it only incurs a small computational overhead for the user to recover the plaintext from the transformed ciphertext. Security of an ABE system with outsourced decryption ensures that an adversary (including a malicious cloud) will not be able to learn anything about the encrypted message; however, it does not guarantee the correctness of the transformation done by the cloud. In this paper, we consider a new requirement of ABE with outsourced decryption: verifiability. Informally, verifiability guarantees that a user can efficiently check if the transformation is done correctly.We give the formal model of ABE with verifiable outsourced decryption and propose a concrete scheme. We prove that our new scheme is both secure and verifiable, without relying on random oracles. Finally, we show an implementation of our scheme and result of performance measurements, which indicates a significant reduction on computing resources imposed on users.


    Implementation:


    kaashiv-research-images

    Implementation:


    kaashiv-research-images

    Access Driven Personal Data in cloud enviroment :


    Subdomained access driven personal data with Edge detection based Facial Recognition system


    Abstract:


    Systematic data access control mechanism to support the selective sharing of composite Personal health records (PHRs) aggregated from various healthcare providers in clouds is one of the open research in the current IT trend. Our approach ensures that privacy concerns are accommodated for processing access requests to patients healthcare information. A patient’s PHRs are typically dispersed over a wide range of distributed systems in the cloud which is specified as different domains. Different systems have different data schemas to manage logical and semantic relationships between different data elements drawn from various medical domains. Such medical domains include patient medications, patient demographics, labs, imaging and pathology or any other medical reports, and a variety of other medical domains from primary specialty and acute care settings. To support the selective sharing of PHRs in clouds, we leverage a hierarchical structure cum Attribute based Encryption technique to show the data in different dimensions based on the variety of users. In turn, represent PHRs from various healthcare domains such as pharmacies, primary care, clinic labs, healthcare insurance and so on. Not only to the third parties, how much leverages can be given to our near by relatives is also controlled in a timely fashion. There have been wide privacy concerns as personal health information could be exposed to the relatives in private domain and those third party servers and to unauthorized parties (In Public domain). Personal Health records view ability access control to the actual data owner is the core idea of this project. The project segregates the access users in to Public Domain Users and Private Domain users. Public Domain users are normal users who will be taking care of serving the patient. So that, the data will be served based on the designation and other attributes of the staffs. Private domain users will be accessed based on the authorization provided by the data owner. In this case, the data will be stored in the format specified by their attributes. Break glass strategy is followed in accessing the data in case of any emergencies. The access will be provided temporarily to invoke the data and the access will be revoked after a specific period of time. In case of emergencies like the user met with an accident. In that case, the user’s face will be recognized for emergency check and appropriate records will be retrieved.


    IEEE Title


    Scalable and Secure Sharing of Personal Health Records in cloud enviroment Using Attribute-Based Encryption:


    IEEE Abstract:


    Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients’ control over access to their own PHRs, it is a promising method to encrypt the PHRs before outsourcing. Yet, issues such as risks of privacy exposure, scalability in key management, flexible access, and efficient user revocation, have remained the most important challenges toward achieving fine-grained, cryptographically enforced data access control. In this paper, we propose a novel patient-centric framework and a suite of mechanisms for data access control to PHRs stored in semitrusted servers. To achieve fine-grained and scalable data access control for PHRs, we leverage attribute-based encryption (ABE) techniques to encrypt each patient’s PHR file. Different from previous works in secure data outsourcing, we focus on the multiple data owner scenario, and divide the users in the PHR system into multiple security domains that greatly reduces the key management complexity for owners and users. A high degree of patient privacy is guaranteed simultaneously by exploiting multiauthority ABE. Our scheme also enables dynamic modification of access policies or file attributes, supports efficient on-demand user/attribute revocation and break-glass access under emergency scenarios. Extensive analytical and experimental results are presented which show the security, scalability, and efficiency of our proposed scheme.


    Implementation:


    kaashiv-research-images

    Implementation:


    kaashiv-research-images

    Access Driven Personal Data in cloud enviroment :


    Subdomained access driven personal data with Edge detection based Facial Recognition system


    Abstract:


    Systematic data access control mechanism to support the selective sharing of composite Personal health records (PHRs) aggregated from various healthcare providers in clouds is one of the open research in the current IT trend. Our approach ensures that privacy concerns are accommodated for processing access requests to patients healthcare information. A patient’s PHRs are typically dispersed over a wide range of distributed systems in the cloud which is specified as different domains. Different systems have different data schemas to manage logical and semantic relationships between different data elements drawn from various medical domains. Such medical domains include patient medications, patient demographics, labs, imaging and pathology or any other medical reports, and a variety of other medical domains from primary specialty and acute care settings. To support the selective sharing of PHRs in clouds, we leverage a hierarchical structure cum Attribute based Encryption technique to show the data in different dimensions based on the variety of users. In turn, represent PHRs from various healthcare domains such as pharmacies, primary care, clinic labs, healthcare insurance and so on. Not only to the third parties, how much leverages can be given to our near by relatives is also controlled in a timely fashion. There have been wide privacy concerns as personal health information could be exposed to the relatives in private domain and those third party servers and to unauthorized parties (In Public domain). Personal Health records view ability access control to the actual data owner is the core idea of this project. The project segregates the access users in to Public Domain Users and Private Domain users. Public Domain users are normal users who will be taking care of serving the patient. So that, the data will be served based on the designation and other attributes of the staffs. Private domain users will be accessed based on the authorization provided by the data owner. In this case, the data will be stored in the format specified by their attributes. Break glass strategy is followed in accessing the data in case of any emergencies. The access will be provided temporarily to invoke the data and the access will be revoked after a specific period of time. In case of emergencies like the user met with an accident. In that case, the user’s face will be recognized for emergency check and appropriate records will be retrieved.


    IEEE Title


    Scalable and Secure Sharing of Personal Health Records in cloud enviroment Using Attribute-Based Encryption:


    IEEE Abstract:


    Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients’ control over access to their own PHRs, it is a promising method to encrypt the PHRs before outsourcing. Yet, issues such as risks of privacy exposure, scalability in key management, flexible access, and efficient user revocation, have remained the most important challenges toward achieving fine-grained, cryptographically enforced data access control. In this paper, we propose a novel patient-centric framework and a suite of mechanisms for data access control to PHRs stored in semitrusted servers. To achieve fine-grained and scalable data access control for PHRs, we leverage attribute-based encryption (ABE) techniques to encrypt each patient’s PHR file. Different from previous works in secure data outsourcing, we focus on the multiple data owner scenario, and divide the users in the PHR system into multiple security domains that greatly reduces the key management complexity for owners and users. A high degree of patient privacy is guaranteed simultaneously by exploiting multiauthority ABE. Our scheme also enables dynamic modification of access policies or file attributes, supports efficient on-demand user/attribute revocation and break-glass access under emergency scenarios. Extensive analytical and experimental results are presented which show the security, scalability, and efficiency of our proposed scheme.


    Implementation:


    kaashiv-research-images

    Implementation:


    kaashiv-research-images

    Related URLs for reference:

    [1] Security threats in cloud enviroment:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6148380&queryText%3Dcloud+computings


    cloud enviroment is set of resources and services offered through the Internet. Cloud services are delivered from data centers located throughout the world. cloud enviroment facilitates its consumers by providing virtual resources via internet. General example of cloud services is Google apps, provided by Google and Microsoft SharePoint. The rapid growth in field of “cloud enviroment” also increases severe security concerns. Security has remained a constant issue for Open Systems and internet, when we are talking about security cloud really suffers. Lack of security is the only hurdle in wide adoption ofcloud enviroment. cloud enviroment is surrounded by many security issues like securing data, and examining the utilization of cloud by the cloud enviroment vendors. The wide acceptance www has raised security risks along with the uncountable benefits, so is the case with cloud enviroment. The boom in cloud enviroment has brought lots of security challenges for the consumers and service providers. How the end users of cloud enviroment know that their information is not having any availability and security issues? Every one poses, Is their information secure? This study aims to identify the most vulnerable security threats in cloud enviroment, which will enable both end users and vendors to know about the key security threats associated with cloud enviroment. Our work will enable researchers and security professionals to know about users and vendors concerns and critical analysis about the different security models and tools proposed.


    [2] Collaboration-Based cloud enviroment Security Management Framework:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6008731&queryText%3Dcloud+computing


    Although the cloud enviroment model is considered to be a very promising internet-based computingplatform, it results in a loss of security control over the cloud-hosted assets. This is due to the outsourcing of enterprise IT assets hosted on third-party cloud enviroment platforms. Moreover, the lack of security constraints in the Service Level Agreements between the cloud providers and consumers results in a loss of trust as well. Obtaining a security certificate such as ISO 27000 or NIST-FISMA would help cloud providers improve consumers trust in their cloud platforms' security. However, such standards are still far from covering the full complexity of the cloud enviroment model. We introduce a new cloud security management framework based on aligning the FISMA standard to fit with the cloudcomputing model, enabling cloud providers and consumers to be security certified. Our framework is based on improving collaboration between cloud providers, service providers and service consumers in managing the security of the cloud platform and the hosted services. It is built on top of a number of security standards that assist in automating the security management process. We have developed a proof of concept of our framework using. NET and deployed it on a test bed cloud platform. We evaluated the framework by managing the security of a multi-tenant SaaS application exemplar.


    [3] Realization of open cloud enviroment federation based on mobile agent:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=5358085&queryText%3Dcloud+computing


    Although cloud enviroment is generally recognized as a technology which will has a significant impact on IT in the future. However, cloud enviroment is still in its infancy, currently, there is not a standard available for it, portability and interoperability is also impossible between different cloud enviromentService Providers, therefore, handicaps the widely deploy and quick development of cloud enviroment, there is still a long distance to the fine scenery which theoretically depicted by cloud enviroment. We analyze the problems in the current state of the art, put forward that Open cloud enviroment Federation is an inevitable approach for the widely use of cloud enviroment and to realize the greatest value of it. Accordingly, we proposal the MABOCCF (Mobile Agent Based Open cloud enviroment Federation) mechanism in this paper, it combines the advantages of Mobile Agent and cloud enviroment to provide a realization for the Open cloud enviroment Federation, MABOCCF can span over multiple heterogeneous cloud enviroment platforms and realizes portability and interoperability, it can be a beginning of open cloud enviroment federation and a future part of cloud enviroment. We also present in this paper the rationalities and the motivations for the combination of Mobile Agent and CloudComputing, finally, a prototype is given with a performance analysis.


    [4] CDA: A Cloud Dependability Analysis Framework for Characterizing System Dependability in cloud enviroment Infrastructures:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6385066&queryText%3Dcloud+computing


    cloud enviroment has become increasingly popular by obviating the need for users to own and maintain complex computing infrastructure. However, due to their inherent complexity and large scale, productioncloud enviroment systems are prone to various runtime problems caused by hardware and software failures. Dependability assurance is crucial for building sustainable cloud enviroment services. Although many techniques have been proposed to analyze and enhance reliability of distributed systems, there is little work on understanding the dependability of cloud enviroment environments. As virtualization has been an enabling technology for the cloud, it is imperative to investigate the impact of virtualization on the cloud dependability, which is the focus of this work. In this paper, we present a cloud dependability analysis (CDA) framework with mechanisms to characterize failure behavior in cloud enviroment infrastructures. We design the failure-metric DAGs (directed a cyclic graph) to analyze the correlation of various performance metrics with failure events in virtualized and non-virtualized systems. We study multiple types of failures. By comparing the generated DAGs in the two environments, we gain insight into the impact of virtualization on the cloud dependability. This paper is the first attempt to study this crucial issue. In addition, we exploit the identified metrics for failure detection. Experimental results from an on-campus cloud enviroment test bed show that our approach can achieve high detection accuracy while using a small number of performance metrics.


    [5] Research on cloud enviroment security problem and strategy:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6202020&queryText%3Dcloud+computing


    The cloud enviroment is a new computing model which comes from grid computing, distributedcomputing, parallel computing, virtualization technology, utility computing and other computer technologies and it has more advantage characters such as large scale computation and data storage, virtualization, high expansibility, high reliability and low price service. The security problem of cloudcomputing is very important and it can prevent the rapid development of cloud enviroment. This paper introduces some cloud enviroment systems and analyzes cloud enviroment security problem and its strategy according to the cloud enviroment concepts and characters. The data privacy and service availability in cloud enviroment are the key security problem. Single security method cannot solve the cloud enviroment security problem and many traditional and new technologies and strategies must be used together for protecting the total cloud enviroment system.


    [6] The issues of cloud enviroment security in high-speed railway:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6023923&queryText%3Dcloud+computing


    cloud enviroment has brought new changes and opportunities to IT industry. It is the result of the evolution of a variety of techniques. And the railway department will use the cloud enviroment technology to achieve the sharing of the railway information resources and to improve the capacity of information processing. But with the development of the cloud enviroment, it also faced with many difficulties, cloudcomputing security has become the leading cause of impeding its development. cloud enviromentsecurity has become a hot topic in industry and academic research. This paper will explore the status of the development of cloud enviroment security, analyze the data privacy, security auditing, data monitoring and other challenges that the cloud enviroment security faced with. We will describe the solutions which the industry and academia proposed for some key issues of cloud enviroment security, such as virtualization security and traffic monitoring between virtual machines and so on. And we analyzed the security of cloud enviroment in railway environment. We proposed a cloud enviroment security reference framework. The purpose of this paper is attempted to bring greater clarity landscape about cloud enviroment security.


    [7] cloud enviroment security threats and responses:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6014715&queryText%3Dcloud+computing


    cloud enviroment is one of today's most exciting technologies due to its ability to reduce costs associated with computing while increasing flexibility and scalability for computer processes. During the past few years, cloud enviroment has grown from being a promising business idea to one of the fastest growing parts of the IT industry. IT organizations have expresses concern about critical issues (such as security) that exist with the widespread implementation of cloud enviroment. These types of concerns originate from the fact that data is stored remotely from the customer's location; in fact, it can be stored at any location. Security, in particular, is one of the most argued-about issues in the cloud enviromentfield; several enterprises look at cloud enviroment warily due to projected security risks. The risks of compromised security and privacy may be lower overall, however, with cloud enviroment than they would be if the data were to be stored on individual machines instead of in a so - called "cloud" (the network of computers used for remote storage and maintenance). Comparison of the benefits and risks of cloud enviroment with those of the status quo are necessary for a full evaluation of the viability ofcloud enviroment. Consequently, some issues arise that clients need to consider as they contemplate moving to cloud enviroment for their businesses. In this paper I summarize reliability, availability, and security issues for cloud enviroment (RAS issues), and propose feasible and available solutions for some of them.


    [8] cloud enviroment learning:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6110925&queryText%3Dcloud+computing


    cloud enviroment is evolving as a key technology for sharing resources. Grid Computing, distributedcomputing, parallel computing and virtualization technologies define the shape of a new era. Traditional distance learning systems lack reusability, portability and interoperability. This paper sees cloudcomputing ecosystem as a new opportunity in designing cloud enviroment educational platforms where learning actors can reuse learning resources handled by cloud educational operating systems. To enhance learning objects portability and interoperability not only cloud enviroment API standards should be advocated by the key cloud providers but also learning resources standards should be defined by the Open cloud enviroment Education Federation as proposed by this paper.


    [9] Research of cloud enviroment security in digital library:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6703173&queryText%3Dcloud+computing


    The cloud enviroment security in digital library was analyzed, for the digital books borrow, cloud storage and other related issues, a specific application of homomorphic encryption mechanism about library cloud enviroment was proposed. Firstly, the cloud enviroment mode of library digital resources is defined, a variety of collections databases and network resources adopt cloud enviroment mode to provide their service, these resources and service are placed in the cloud. And then the cloud key distribution scheme to adapt to library applications was presented, the improved traditional PKI, the PKI-based cloud enviroment communication and privacy protection mechanisms for library are introduced. The corresponding solution detail are proposed also: library cloud enviroment key distribution, authentication and encryption methods, more secure homomorphic encryption mechanism for library information retrieval. Preliminary analysis indicates that, these measures can protect the privacy and information security of library cloud enviroment.


    [10] Cooperative cloud enviroment in research and academic environment using Virtual Cloud:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6375445&queryText%3Dcloud+computing


    cloud enviroment is becoming as a main choice computing paradigm for the enterprises. Use of cloudcomputing technologies is increasing by every passing day. It has great advantages of on-demandcomputing, scalability, proactive resource management, better application throughput, and enhanced security. Due to its openness and adaptability, it can be a good option for voluntary resource computing among non-profit organizations. In this paper, we present a model for cooperative cloud enviroment among research institutes and universities using Virtual Cloud concepts. The propose model of Cooperative cloud enviroment encompasses the concepts of cloud federation and volunteer computing and is based on our Virtual Cloud architecture. The cooperative cloud enviroment can be performed at a global scale among universities and research centers (institutes) located in different continents. In this model, institutes get benefited with a much higher computing power available through cloud federation.

    [11] Property-Based Remote Attestation Oriented to cloud enviroment:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6128280&queryText%3Dcloud+computing


    As the new computing service pattern of cloud enviroment develops rapidly, the security problem ofcloud enviroment has become a hot research topic. Before the user passes important data orcomputing task to the cloud, the user of the cloud may want to verify the trusted status of the platform which actually carries out the computing task in the cloud. And the remote attestation mechanism in Trusted Computing is suited for the cloud user's verification need. In this paper, the property-based remote attestation mechanism in Trusted Computing is imported into clouding computing, and a property-based remote attestation method oriented to cloud enviroment is designed based on the characteristics of cloud enviroment. In this method, through the attestation proxy, the remote attestation of the computing platform's security property is realized without disclosing the platform's configuration, and users can validate the security property of the actual computing platform in the virtual cloud enviroment environment.


    [12] Green cloud enviroment: Balancing Energy in Processing, Storage, and Transport:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=5559320&queryText%3Dcloud+computing


    Network-based cloud enviroment is rapidly expanding as an alternative to conventional office-basedcomputing. As cloud enviroment becomes more widespread, the energy consumption of the network and computing resources that underpin the cloud will grow. This is happening at a time when there is increasing attention being paid to the need to manage energy consumption across the entire information and communications technology (ICT) sector. While data center energy use has received much attention recently, there has been less attention paid to the energy consumption of the transmission and switching networks that are key to connecting users to the cloud. In this paper, we present an analysis of energy consumption in cloud enviroment. The analysis considers both public and private clouds, and includes energy consumption in switching and transmission as well as data processing and data storage. We show that energy consumption in transport and switching can be a significant percentage of total energy consumption in cloud enviroment. cloud enviroment can enable more energy-efficient use of computing power, especially when the computing tasks are of low intensity or infrequent. However, under some circumstances cloud enviroment can consume more energy than conventional computingwhere each user performs all computing on their own personal computer (PC).


    [13] Research on cloud enviroment data security model based on multi-dimension:



    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6291448&queryText%3Dcloud+computing


    cloud enviroment is considered to be the next generation of information technology framework. It is the next generation computing platforms that can provide dynamic resource pools, virtualization and high availability. The new character brings a lot of new security challenges which have not been taken into account completely in the current cloud enviroment system. As a consequence, to build a cloud enviroment data security system is the basis to build cloud enviroment security system. In this article, the cloud enviroment technology architecture and the cloud enviroment data security features are the first to be studied and considered, then the cloud enviroment data security model is raised. At last, the realization of data security model has been researched. The model adopts a multi-dimension architecture of three - layers defense. First of all, user authentication is required to ensure that user data cannot be tampered. Users who pass the anthentication can get relative operation on the user data, such as addition, modification, deletion. If the unauthorized user use illegal means to deceive the authentication system, the file entered the system encrypt and privacy defense levels. In this layer, user data is encrypted. If key has been got by the intruder. The user data cannot be got valid information even it is obtained through function of privacy protection. It is very important for commercial users of the cloud enviroment to protect their business secrets. The last is the file quick regeneration layer, user data can get maximum regeneration even it is damaged through rapid regeneration algorithm in this layer. Each layer accomplishes its own job and combines with others to ensure data security in the cloud enviroment.


    [14] Modeling and simulation of cloud enviroment: A review:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6486505&queryText%3Dcloud+computing


    cloud enviroment provides computing resources as a service over a network. As rapid application of this emerging technology in real world, it becomes more and more important how to evaluate the performance and security problems that cloud enviroment confronts. Currently, modeling and simulation technology has become a useful and powerful tool in cloud enviroment research community to deal with these issues. In this paper, to the best of our knowledge, we review the existing results on modeling and simulation of cloud enviroment. We start from reviewing the basic concepts of cloud enviroment and its security issues, and subsequently review the existing cloud enviroment simulators. Furthermore, we indicate that there exist two types of cloud enviroment simulators, that is, simulators just based on software and simulators based on both software and hardware. Finally, we analyze and compare features of the existing cloud enviroment simulators.


    [15] cloud enviroment - concepts, architecture and challenges:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6203873&queryText%3Dcloud+computing


    With the advent internet in the 1990s to the present day facilities of ubiquitous computing, the internet has changed the computing world in a drastic way. It has traveled from the concept of parallelcomputing to distributed computing to grid computing and recently to cloud enviroment. Although the idea of cloud enviroment has been around for quite some time, it is an emerging field of computer science. cloud enviroment can be defined as a computing environment where computing needs by one party can be outsourced to another party and when need be arise to use the computing power or resources like database or emails, they can access them via internet. cloud enviroment is a recent trend in IT that moves computing and data away from desktop and portable PCs into large data centers. The main advantage of cloud enviroment is that customers do not have to pay for infrastructure, its installation, required man power to handle such infrastructure and maintenance. In this paper we will discuss what makes all this possible, what is the architectural design of cloud enviroment and its applications.


    [16] New Instructional Models for Building Effective Curricula on cloud enviroment Technologies and engineering :

    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6735405&queryText%3Dcloud+computing


    This paper presents ongoing work to develop advanced education and training course on the CloudComputing technologies foundation and engineering by a cooperating group of universities and the professional education partners. The central part of proposed approach is the Common Body of Knowledge in cloud enviroment (CBK-CC) that defines the professional level of knowledge in the selected domain and allows consistent curricula structuring and profiling. The paper presents the structure of the course and explains the principles used for developing course materials, such as Bloom's Taxonomy applied for technical education, and andragogy instructional model for professional education and training. The paper explains the importance of using the strong technical foundation to build the course materials that can address interests of different categories of stakeholders and roles/responsibilities in the cloud enviroment services provisioning and operation. The paper provides a short description of summary of the used cloud enviroment related architecture concepts and models that allow consistent mapping between CBK-CC, stakeholder roles/responsibilities and required skills, explaining also importance of the requirements engineering stage that provides a context for cloudbased services design. The paper refers to the ongoing development of the educational course on cloud enviroment at the University of Amsterdam, University of Stavanger and provides suggestions for building advanced online training course for IT professionals.


    [17] Impact of security risks on cloud enviroment adoption:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6120232&queryText%3Dcloud+computing


    cloud enviroment has been a paradigm shift in the information technology domain. It offers potential benefits to users in terms of instant availability, scalability and resource sharing, while potentially posing security issues. Especially, recent events like Amazons system failure increased the concerns related to cloud enviroment. Given these security and reliability concerns , we explore the optimal decision rule for moving certain IT function to public clouds. We formulate the problem as an entrepreneurial decision for an optimal stopping time at which the entrepreneur shall migrate to the cloud enviroment paradigm. Two different models are presented. Recognizing that an important and specific issue related to different computing paradigm is the potential "security" risk posed by each technology, we consider security risks in both models. The first model approaches the optimal adoption problem from assessing the cloud enviroment adoption under project value uncertainty. The entrepreneur has the timing flexibility and solves his optimal adoption decision under uncertainty. The optimal adoption rule obtained is a threshold strategy. A firm should adopt the cloud enviroment only if the value from the adoption exceeds the threshold level. The second model builds on a comprehensive assessment of two differentcomputing paradigms. The entrepreneur can either keep the traditional on-site computing paradigm or migrate to the cloud enviroment paradigm. His problem is to make the paradigm shift optimally. We model such a problem as optimally swapping two "risky" assets, which refer to benefits of the traditional on-site computing paradigm and those of the cloud enviroment paradigm. The term "risky" captures the fact that actual benefits can only be resolved through time, and thus estimates of benefits are embedded with uncertainty. We obtain the optimal swapping rule as a threshold strategy, defined in terms of the two benefit ratio. A firm should only shift the part of its bus- ness to the cloud enviromentservice if the ratio, the benefit from the cloud enviroment paradigm over that from the traditional on-sitecomputing paradigm, exceeds the threshold. In both models, both the extent of riskiness (i.e. uncertainty) and the significance of security risks (both in terms of potential occurrence probability and the severity of damage) affect the threshold level, thus the entrepreneurial adoption decision.


    [18] A New Technique of Data Integrity for Analysis of the cloud enviroment Security:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6658038&queryText%3Dcloud+computing


    cloud enviroment is a latest and fast growing technology that offers an innovative, efficient and scalable business model for organizations to adopt various information technology resources i.e. software, hardware, network, storage, bandwidth etc. cloud enviroment is a jargon term without a commonly accepted non-ambiguous scientific or technical definition. At the foundation of cloud enviroment is the broader concept of converged infrastructure and shared services. It has the capability to incorporate multiple internal and external cloud services together to provide high interoperability there can be multiple accounts associated with a single or multiple service provider (SPs). So, Security in terms of integrity is most important aspects in cloud enviroment environment. In this paper, a detailed analysis of the cloud security problem is presented. Also the different problem in a cloud enviroment system and their effect upon the different cloud users are analyzed. It is providing a comparably scalable, position independent. Low cost platform for client's data. Since cloud enviroment environment is constructed based on open Architecture and interface. Based on this analysis various computing system and their effect upon the system, upon organizations and also upon different cloud users are analyzed. It is providing a comparably scalable, position-independent, low cost platform for client's data. Since cloud enviroment environment is constructed based on open architecture and interface. Based on this analysis various researches have also presented a view of measures that can be taken to deal with the cloud security problem and prevention that must be taken into account by any organization and cloud users seeking investment in cloud enviroment.


    [19] Roystonea: A cloud enviroment System with Pluggable Component Architecture:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6121263&queryText%3Dcloud+computing


    A cloud enviroment system provides infrastructure layer services to users by managing virtualized infrastructure resources. The infrastructure resources include CPU, hyper visor, storage, and networking. Each category of infrastructure resources is a subsystem in a cloud enviroment system. The cloud enviroment system coordinates infrastructure subsystems to provide services to users. Most current cloud enviroment systems lacks pluggability in their infrastructure subsystems and decision algorithms, which restricts the development of infrastructure subsystems and decision algorithms incloud enviroment system. A cloud enviroment system should have the flexibility to switch from one infrastructure subsystem to another, and one decision algorithm to another with ease. This paper describes Roystonea, a hierarchical distributed cloud enviroment system with plug gable component architecture. The component pluggability ability gives administrators the flexibility to use the most appropriate subsystem as they wish. The component pluggability of Roystonea is based on a specifically designed interfaces among Roystonea controlling system and infrastructure subsystems components. The component pluggability also encourages the development of infrastructure subsystems in cloud enviroment. Roystonea provides a test bed for designing decision algorithms used in cloud enviroment system. The decision algorithms are totally isolated from other components in Roystonea architecture, so the designers of the decision algorithms can focus on algorithm design without worrying about how his algorithm will interact with other Roystonea components. We believed that component pluggability will be one of the most important issues in the research of cloud enviroment system.


    [20] cloud enviroment for education and learning: Education and learning as a service (ELaaS):


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6059655&queryText%3Dcloud+computing



    cloud enviroment, despite its hype, is being widely deployed, with its dynamic scalability and usage of virtualized resources, in many organizations for several applications. It is envisioned that, in the near future, cloud enviroment will have a significant impact on the educational and learning environment, enabling their own users (i.e., learners, instructors, and administrators) to perform their tasks effectively with less cost by utilizing the available cloud-based applications offered by the cloud service providers. This paper discusses the use of cloud enviroment in the educational and learning arena, to be called “Education and Learning as a Service” (ELaaS), emphasizing its possible benefits and offerings. It is essential for an educational and learning organization, with its budget restrictions and sustainability challenges, to use the cloud formation best suited for a particular IT activity. The Jericho Forum proposes a cloud enviroment formation model, called the Cloud Cube Model (CCM), which is based on 4 criteria. To preserve the symmetry of the cube, a new cloud enviroment formation model, called the Complete cloud enviroment Formations (C3F), is proposed. The IT activities in the educational and learning organizations are then classified with respect to the two criteria: mission criticality and sensitivity. Each class is then mapped into the appropriate position in the C3F, creating ELaaS Quadrant. This essentially establishes a general conceptual framework for ELaaS.


    [21] Can cloud enviroment Be Used for Planning? An Initial Study:

    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6133120&pageNumber%3D2%26queryText%3Dcloud+computing



    cloud enviroment is emerging as a prominent computing model. It provides a low-cost, highly accessible alternative to other traditional high-performance computing platforms. It also has many other benefits such as high availability, scalability, elasticity, and free of maintenance. Given these attractive features, it is very desirable if automated planning can exploit the large, affordable computational power of cloud enviroment. However, the latency in inter-process communication in cloud enviroment makes most existing parallel planning algorithms unsuitable for cloud enviroment. In this paper, we propose a portfolio stochastic search framework that takes advantage of and is suitable for cloud enviroment. We first study the running time distribution of Monte-Carlo Random Walk (MRW) search, a stochastic planning algorithm, and show that the running time distribution usually has remarkable variability. Then, we propose a portfolio search algorithm that is suitable for cloud enviroment, which typically has abundant computing cores but high communication latency between cores. Further, we introduce an enhanced portfolio with multiple parameter settings to improve the efficiency of the algorithm. We implement the portfolio search algorithm in both a local cloud and the Windows Azure cloud. Experimental results show that our algorithm achieves good, in many cases super linear, speedup in the cloud platforms. Moreover, our algorithm greatly reduces the running time variance of the stochastic search and improves the solution quality. We also show that our scheme is economically sensible and robust under processor failures.


    [22] Adaptive Anomaly Identification by Exploring Metric Subspace in cloud enviroment Infrastructures:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6656276&pageNumber%3D2%26queryText%3Dcloud+computing


    cloud enviroment has become increasingly popular by obviating the need for users to own and maintain complex computing infrastructures. However, due to their inherent complexity and large scale, production cloud enviroment systems are prone to various runtime problems caused by hardware and software faults and environmental factors. Autonomic anomaly detection is a crucial technique for understanding emergent, cloud-wide phenomena and self-managing cloud resources for system-level dependability assurance. To detect anomalous cloud behaviors, we need to monitor the cloud execution and collect runtime cloud performance data. These data consist of values of performance metrics for different types of failures, which display different correlations with the performance metrics. In this paper, we present an adaptive anomaly identification mechanism that explores the most relevant principal components of different failure types in cloud enviroment infrastructures. It integrates the cloudperformance metric analysis with filtering techniques to achieve automated, efficient, and accurate anomaly identification. The proposed mechanism adapts itself by recursively learning from the newly verified detection results to refine future detections. We have implemented a prototype of the anomaly identification system and conducted experiments in an on-campus cloud enviroment environment and by using the Google data center traces. Our experimental results show that our mechanism can achieve more efficient and accurate anomaly detection than other existing schemes.


    [23] Power management in cloud enviroment using green algorithm:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6215585&pageNumber%3D2%26queryText%3Dcloud+computing


    The greatest environmental challenge today is global warming, which is caused by carbon emissions. Energy crisis brings green computing, and green computing needs algorithms and mechanisms to be redesigned for energy efficiency. Green IT refers to the study and practice of using computingresources in an efficient, effective and economic way. The various approaches of the green IT are Virtualization, Power Management, Material Recycling and Telecommuting. The basic principles ofcloud enviroment is to make the computing be assigned in a great number of distributed computers rather than local computer or remote server. In fact, cloud enviroment is an extend of Grid Computing, Distributed Computing and Parallel Computing. It's foreground is to provide secure, quick, convenient data storage and net computing service centered by internet. Currently, a large number of cloud enviroment systems waste a tremendous amount of energy and emit a considerable amount of carbon dioxide. Thus, it is necessary to significantly reduce pollution and substantially lower energy usage. The analysis of energy consumption in cloud enviroment consider both public and private clouds. cloud enviroment with green algorithm can enable more energy-efficient use of computing power.


    [24] An analysis of cloud enviroment security issues


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=4154555&pageNumber%3D5%26queryText%3Dautomation+system


    In this study, electrical distribution automation system (DAS) at low voltage (LV) to solve the problems experienced in the presence of the power supply cut off due to the line under repair or fault. Fault detection, fault identification, fault isolation and fault clearing tasks been done using DAS solution technique. The system implemented in this project operates and controls the equipment connected at the substation and distribution line/zone/pole remotely. The equipment is divided into two types, one type is installed at the substation and the other type is located to the distribution line pole/or distribution board of the consumers. All the equipment is linked by communication line connected between the substation and the controlled zone; all equipment is controlled and operated remotely to operate and control the distribution system and to communicate each other while sitting in the control room at the sub-station.


    [25] Analysis and Research of cloud enviroment System Instance


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=5431877&pageNumber%3D2%26queryText%3Dcloud+computing


    As a kind of emerging business computational model, cloud enviroment distribute computation task on the resource pool which consists of massive computers, accordingly ,the application systems can gain the computation strength, the storage space and software service according to its demand. cloud enviroment can be viewed from two different aspects. One is about the cloud infrastructure which is the building block for the up layer cloud application. The other is of course the cloud application. By means of three technical methods, cloud enviroment has achieved two important goals for the distributed computing: high scalability and high availability. Scalability means that the cloud infrastructure can be expanded to very large scale even to thousands of nodes. Availability means that the services are available even when quite a number of nodes fail. This paper discusses the evolution process of cloud enviroment, the current technologies adopted in cloud enviroment, as well as the systems in enterprises. This paper introduced with emphasis the Amazon Elastic Compute Cloud, the cloud enviroment platform of Google and "blue cloud" of IBM, analyze and compare three kinds of cloud enviroment platform.


    [26] Tutorial: Secure Multiparty Computation for cloud enviroment Paradigm by Durgesh Kumar Mishra:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=5701921&pageNumber%3D2%26queryText%3Dcloud+computing


    Summary form only given. Secure Multiparty Computation (SMC) allows multiple parties to perform computation on their private data to evaluate some function of their common interest. In this paradigm the individual data should be kept secret from other parties and the result of the computation should be available to all the parties. This subject of information security has created enormous interest among researchers. Many SMC models were devised and analyzed. The subject is becoming more relevant in this scenario of huge online transactions on the Internet. Many solutions, from earlier Millionaires Problem to recent Anonymity based computation on encrypted data are available in the literature. cloud enviroment is a paradigm shift from the distributed computing where an organization uses resources as service. This is a sort of "utility computing" where you pay-as-you-go like electricity bill. Cloud providers are the companies which manage large datacenters and have expertise of operating these datacenters. Cloud users are the organizations which use services from providers. Cloud users need not to deploy computing resources at their site. These resources are available from the cloud providers on utility basis and charged on usage basis. Thus an organization can improve efficiency while minimizing the expenditure and the operation overhead. They can focus on their core competencies. In this paradigm users send their data to the provider for computation and the result is provided by the provider. Many companies like Amazon, Google, IBM etc. are already in the market working as the cloud provider. As the services are gaining more popularity, concerns regarding the privacy of these data are also arising. They users of the cloud are worrying about the privacy of their data that has been supplied to the cloud provider. The solutions to these problems can be provided by the protocols of the SMC. In this tutorial, we propose SMC solution techniques that can be embedded while - designing architecture of cloud enviroment especially when multiple cloud providers or multiple cloud users jointly compute some function of their private data inputs. Each of the users or providers of the cloud is worried about the privacy of the individual data but due to the mutual interest all of them want to know the value of the common function. With our experience of developing protocols and devising algorithms for various SMC problems we anticipate a crucial role of SMC in cloud enviroment. For example consider a case where multiple cloud users jointly work on a project and utilize the services of the same cloud provider. All of them want to simultaneously evaluate their equations without revealing individual equations to one another. In such scenarios the SMC solutions can be highly useful to provide privacy. In this tutorial, we explore such scenarios while discussing various protocols of SMC and their applicability in cloud enviroment.


    [27] Security threats and solutions in cloud enviroment:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6751034&pageNumber%3D2%26queryText%3Dcloud+computing


    Information Technology infrastructure continues to grow with evolving technology. The invention of the Internet has increased the use of computer and the mobile device. Nowadays, many people in the world use these devices. As a result, a large amount of data stored device and each device in the Internet were required to be connected each other because of sharing information. New business model has emerged with the increase of data and the development of Internet and mobile technology. This new business model is referred to as cloud enviroment. The cloud enviroment offers many advantages, but there are also many disadvantages. The advantages are flexibility and scalability and better security and large enterprises. This paper identifies security threats focused on cloud enviroment which is an essential part of the companies that want to use cloud enviroment services. The fundamental risk factors particular the cloud are elaborated. Finally, this paper provides some solutions about security threats for enterprise and service provider for the cloud enviroment deployment in order to provide the security of information. This paper does not mention new idea or innovation about cloud enviroment. Purpose of this study is intended to be a guide for people who is interested in cloud enviroment and want to take advantage of the cloud enviroment services.


    [28]Architecture and Key Issues of IMS-Based cloud enviroment:



    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6676750&pageNumber%3D2%26queryText%3Dcloud+computing


    cloud enviroment is changing the way of developing, deploying and managing applications. However, as typical Internet-based applications, cloud enviroment services lack carrier-grade signaling control mechanism and cannot guaranty Quality of Service (QoS), which have actually become technical barriers for telecom operator to provide commercial public cloud services. On the other hand, as the core signaling architecture of Next Generation Networking (NGN), IP Multimedia Subsystem (IMS) is facing the problem of the lack of innovative value-added services. This paper presents an architecture to support cloud enviroment services over IMS. In the proposed architecture, cloud services are regarded as the general IMS applications and then cloud clients are allowed to access cloud services under the control of Session Initiation Protocol (SIP) signaling and QoS mechanism of IMS. This paper introduces architecture overview and cloud service relevant functional components, and mainly discusses several key issues including cloud notification mechanism, QoS and charging control of IMS-based cloud enviroment services.


    [29] STAR: A proposed architecture for cloud enviroment applications:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6489596&pageNumber%3D5%26queryText%3Dautomation+system


    With rapid development of cloud enviroment, the need for an architecture to follow in developing cloud enviroment applications is necessary. Existing architectures lack the way cloud applications are developed. They focus on clouds' structure and how to use clouds as a tool in developing cloud enviroment applications rather than focusing on how applications themselves are developed using clouds. This paper presents a survey on key cloud enviroment concepts, definitions, characteristics, development phases, and architectures. Also, it proposes and describes a novel architecture, which aid developers to develop cloud enviroment applications in a systematic way. It discusses how cloud enviroment transforms the way applications are developed/delivered and describes the architectural considerations that developers must take when adopting and using cloud enviroment technology.


    [30] cloud enviroment and security measure:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6745284&pageNumber%3D2%26queryText%3Dcloud+computing


    This paper presents the design and implementation of a Java-based automation system that can monitor and control home appliances via the World Wide Web. The design is based on a stand alone embedded system board integrated into a PC-based server at home. The home appliances are connected to the input/output ports of the embedded system board and their status are passed to the server. The monitoring and control software engine is based on the combination of JavaServer pages, JavaBeans, and interactive C. The home appliances can be monitored and controlled locally via the embedded system board, or remotely through a Web browser from anywhere in the world provided that an Internet access is available. The system is scalable and allows multi-vendor appliances to be added with no major changes to its core. Password protection is used to block unauthorized users from accessing the appliances at home. If the Internet connection is down or the server is not up, the embedded system board still can control and operate the appliances locally.


    [31] GreenCloud for Simulating QoS-Based NaaS in cloud enviroment:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6746535&pageNumber%3D2%26queryText%3Dcloud+computing


    cloud enviroment that was introduced when local facilities could not any more satisfy access demands along with the increase of network bandwidth and diversity of services, breaks constraints of physical deployment and delivers varieties of services in its hardware/software virtualized manner. Being inherited the idea, the NaaS as a new presented research field ever since the cloud enviroment being introduced, delivers network itself as a kind of service under such circumstances. By its concept, the network utilization will no longer be restricted by physical network or local facilities, but is able to expropriate any network resources within the cloud once they are virtualization organized. Green Cloud simulation as one of the NS-2 cloud enviroment simulators, implements an energy-aware cloud enviroment scenario with infrastructures (switches, routers, links, etc.) virtualized in data center. In this paper, we discusses the Network as a Service (NaaS), a cloud architecture that delivers virtualized network as per demands from cloud user, with illustration of QoS-based Green Cloud simulation, that to present the behavior and performance of NaaS in cloud enviroment environment.


    [32] Emerging security challenges in cloud enviroment: An insight to cloud security challenges and their mitigation:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6141247&pageNumber%3D2%26queryText%3Dcloud+computing


    cloud enviroment has changed the whole picture that distributed computing used to present e.g. Grid computing, server client computing. Cloud has given a new meaning to distributed, and off-premises computing. Although, Cloud offers great benefits, it also introduces a myriad of security threats to the information and data which is now being ported from on-premises to off-premises. Where cloud enviroment can help organizations accomplish more by paying less (in the longer run) and breaking the physical boundaries between IT infrastructure and its users, due to openness of accessible information and data relying on trust between cloud provider and customer, heightened security threats must be overcome in order to benefit fully from this new computing exemplar. Breach in the security of any component in the cloud can be both disaster for the organization (the customer) and defacing for the provider. This paper explores the security issues related to the cloud. The paper also discusses the existing security approaches to secure the cloud infrastructure and applications and their drawbacks. Finally, we explore some key research challenges of implementing new cloud-aware security solutions that can provide the likes of pre-emptive protection for complex and ever dynamic Cloud infrastructure, followed by conclusion where we try to entail the whole research and try to formulate a security strategy which will enable the Cloud providers and customers alike to fight against ever emerging security threats.


    [33] Integrating ZigBee lighting control into existing building automation systems:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6767183&pageNumber%3D2%26queryText%3Dcloud+computing


    cloud enviroment technology which is next-generation architecture has created hype in IT and business world promising to deliver wide range of benefits. Gartner estimated that cloud market will surpass $148.8 billion by 2014. Despite the fact cloud enviroment technology remains for many an unfamiliar concept. Therefore, if cloud enviroment technology is to achieve its potential then there is need to have a clear understanding of various factors associated with its adoption by business. cloud enviroment technology has already started impacting businesses and penetrated many areas from banks, automobile sector, education, logistics, wholesale, retail and health care. It is also emerging as a major enablers for the manufacturing industry that can transform the traditional business model, help it with product innovation with business strategy and create effective factory networks with collaboration. Adoption of cloud enviroment technology in supply chains of manufacturing industry will also improve performance in the form of better information visibility, cost reduction, and improved agility. For IS researchers, this study will outline factors associated with adaption of cloud enviroment technology in supply chains of manufacturing industry so that they will be in a position to advise the industry in the years to come. The paper will start by general introduction with an overview about cloud enviroment. Then, it will summarize the literature work that has been done so far with advantages of cloud enviroment technology. In next section, the theoretical framework will be described. Finally, the paper will close with a conclusion .


    [34] An Investigation of the Effect of cloud enviroment on Network Management


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=5431874&pageNumber%3D2%26queryText%3Dcloud+computing


    cloud enviroment is one of the fascinating advancements in the computing technology. With its fashionable features, cloud deployment is well spread in a wide range of applications. Managing the cloud environment is a complex process because of the virtual nature of the cloud. Cloud management is different from the conventional network management in many aspects. This paper summarizes the functionalities and the importance of network management and reveals the effect of cloud enviroment over the conventional network management. The five functional areas defined by ISO for network management are mainly concentrated: fault, configuration, accounting, performance and security. Some of the issues faced by cloud enviroment and their effect in cloud performance have been discussed. Some principles for the network management to support cloud enviroment and to solve the issues of cloud enviroment are also suggested. As an important outcome of this academic work, the effects and impacts of cloud enviroment over network management policies have been delivered to a reasonable depth.


    [35] cloud enviroment Research and Development Trend


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=5431874&pageNumber%3D2%26queryText%3Dcloud+computing

    With the development of parallel computing, distributed computing, grid computing, a new computing model appeared. The concept of computing comes from grid, public computing and SaaS. It is a new method that shares basic framework. The basic principles of cloud enviroment is to make the computing be assigned in a great number of distributed computers, rather then local computer or remoter server. The running of the enterprise's data center is just like Internet. This makes the enterprise use the resource in the application that is needed, and access computer and storage system according to the requirement. This article introduces the background and principle of cloud enviroment, the character, style and actuality. This article also introduces the application field the merit of cloud enviroment, such as, it do not need user's high level equipment, so it reduces the user's cost. It provides secure and dependable data storage center, so user needn't do the awful things such storing data and killing virus, this kind of task can be done by professionals. It can realize data share through different equipments. It analyses some questions and hidden troubles, and puts forward some solutions, and discusses the future of cloud enviroment. cloud enviroment is a computing style that provide power referenced with IT as a service. Users can enjoy the service even he knows nothing about the technology of cloud enviroment and the professional knowledge in this field and the power to control it.



    [36] Design and Implementation of Hybrid cloud enviroment Architecture Based on Cloud Bus


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6726345&pageNumber%3D2%26queryText%3Dcloud+computing


    A new model of hybrid cloud enviroment architecture based on cloud bus is proposed. The system is based on local private cloud, combined with one or more type(s) of public cloud(s). The internal structures of private cloud and public cloud are the same, including infrastructure and virtualization layer, cloud platforms layer, cloud bus layer, cloud application layer, the management center and storage centers. The layer of infrastructure and virtualization is designed to incorporate the underlying hardware resources into a virtual cluster, providing a variety of virtual resources to the upper layer. The layer of cloud platform is used to run Web applications or services, and carry application-specific development and application integration through its open interfaces. The cloud bus layer, consisting of a control bus, a number of node buses and adapters, is designed to manage and monitor the various services of the cloud platform layer. The proposed model of the architecture can accelerate the migration of the existing IT environments to cloud enviroment environments, reduce the investment, and make full use of IT resources.


    [37] The Current State of Understanding of the Energy Efficiency of cloud enviroment:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6296228&pageNumber%3D2%26queryText%3Dcloud+computing


    cloud enviroment has been hailed as the achievement of the long-held dream of computing as a utility and has the potential to transform a large part of the Information and Communication Technology (ICT) industry. cloud enviroment is both a business and an economic model which has been gaining popularity since 2006 and it is currently the most talked about technology in the ICT industry. Because it views hardware and software as commodities, the cloud is an example of a disruptive technology. It offers enterprises the opportunity to reduce hardware and software cost and the potential reduction of maintenance and support staff. Data centers and cloud enviroment services providers hope that the widespread adoption of the cloud will bring them more profit and they are actively promoting the technology. The cloud has had its share of controversy; ranging from the definition of cloud enviroment to its energy efficiency. This paper discusses one area of controversy; the energy efficiency of cloud enviroment. We outline previous contributions to the discussion of energy efficiency of cloud enviroment, provide a working definition of cloud enviroment and discuss its importance, which will grow as the technology matures and becomes well known.


    [38] An efficient and secured data storage scheme in cloud enviroment using ECC-based PKI:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6779015&pageNumber%3D2%26queryText%3Dcloud+computing


    cloud enviroment is set of resources and services offered through the Internet. Cloud services are delivered from data centres located throughout the world. cloud enviroment facilitates its consumers by providing virtual resources via internet. The rapid growth in field of "cloud enviroment" also increases severe security concerns. Security has remained a constant issue for Open Systems and internet, when we are talking about security, cloud really suffers. Lack of security is the only hurdle in wide adoption of cloud enviroment. cloud enviroment is surrounded by many security issues like securing data and examining the utilization of cloud by the cloud enviroment vendors. This paper proposes a scheme to securely store and access of data via internet. We have used ECC based PKI for certificate procedure because the use of ECC significantly reduces the computation cost, message size and transmission overhead over RSA based PKI as 160-bit key size in ECC provides comparable security with 1024-bit key in RSA. We have designed Secured Cloud Storage Framework (SCSF). In this framework, users not only can securely store and access data in cloud but also can share data with multiple users through the unsecure internet in a secured way. This scheme can ensure the security and privacy of the data in the cloud..


    [39] The security of cloud enviroment system enabled by trusted computing technology:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=5555234&pageNumber%3D2%26queryText%3Dcloud+computing


    cloud enviroment provides people the way to share distributed resources and services that belong to different organizations or sites. Since cloud enviroment share distributed resources via the network in the open environment, thus it makes security problems important for us to develop the cloud enviroment application. In this paper, we pay attention to the security requirements in cloud enviroment environment. We proposed a method to build a trusted computing environment for cloud enviroment system by integrating the trusted computing platform into cloud enviroment system. We propose a model system in which cloud enviroment system is combined with trusted computing platform with trusted platform module. In this model, some important security services, including authentication, confidentiality and integrity, are provided in cloud enviroment system.


    [40] The comparison between cloud enviroment and grid computing:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=5623257&pageNumber%3D2%26queryText%3Dcloud+computing


    It is a great idea to make many normal computers together to get a super computer, and this computer can do a lot of things. This is the concept of cloud enviroment. cloud enviroment is an emerging model of business computing. And it is becoming a development trend. This article compares cloud enviroment and grid computing. Internet has connected all the computers in the world. Grid computing has been put forward under this background. Its core concept is to complete computing based on compute grid, in it every computer will devote power. In recent years a new concept cloud enviroment has been put forward, it can connect millions of computers to a super cloud. This article also introduces the application field the merit of cloud enviroment, such as, it do not need user's high level equipment, so it reduces the user's cost. It provides secure and dependable data storage center, so user needn't do the awful things such storing data and killing virus, this kind of task can be done by professionals. It can realize data share through different equipments. The users need not know how the cloud runs. In this paper I describe the concept of cloud enviroment and grid computing and compare them.


    [41] Enhanced data security model for cloud enviroment:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6236556&pageNumber%3D2%26queryText%3Dcloud+computing


    cloud enviroment becomes the next generation architecture of IT Enterprise. In contrast to traditional solutions, cloud enviroment moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique feature, however, raises many new security challenges which have not been well understood. In cloud enviroment, both data and software are fully not contained on the user's computer; Data Security concerns arising because both user data and program are residing in Provider Premises. Clouds typically have a single security architecture but have many customers with different demands. Every cloud provider solves this problem by encrypting the data by using encryption algorithms. This paper investigates the basic problem of cloud enviroment data security. We present the data security model of cloud enviroment based on the study of the cloud architecture. We improve data security model for cloud enviroment. We implement software to enhance work in a data security model for cloud enviroment. Finally apply this software in the Amazon EC2 Micro instance.


    [42] Real-Time Adaptive Automation System Based on Identification of Operator Functional State in Simulated Process Control Operations:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=5345873&pageNumber%3D5%26queryText%3DAutomation+system


    This paper proposes a new framework for the online monitoring and adaptive control of automation in complex and safety-critical human-machine systems using psychophysiological markers relating to humans under mental stress. The starting point of this framework relates to the assessment of the so-called operator functional state using psychophysiological measures. An adaptive fuzzy model linking heart-rate variability and task load index with the subjects' optimal performance has been elicited and validated offline via a series of experiments involving process control tasks simulated on an automation-enhanced Cabin Air Management System. The elicited model has been used as the basis for an online control system via the predictions of the system performance indicators corresponding to the operator stressful state. These indicators have been used by a fuzzy decision maker to modify the level ofautomation under which the system may operate. A real-time architecture has been developed as a platform for this approach. It has been validated in a series of human volunteer studies with promising improvement in performance.


    [43] Thermal analysis automation system for semiconductor package:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=4525028&pageNumber%3D6%26queryText%3DAutomation+system


    The technology of thermal analysis is very important in development of a new generation of IC package design, which aims to obtain the temperature distribution and thermal resistance of package. Most IC design engineers and package engineers have many difficulties in performing thermal analysis because they are familiar with the product structure but poor in thermal-physical modeling and FEA skills. To assist IC design engineers and package engineers to perform thermal analysis efficiently and accurately, a fully automation system (WBExcel) that has the ability to complete the whole package thermal analysis automatically has been developed based on ANSYSreg Workbench and Excel. The WBExcel consist of four modules: a Package Model Information Library, an executable Wizard System, a Package Material Library and an Environment Library. The general methodology of developing thisautomation system is introduced. The application on PCB level analysis and component level analysis is presented and indicates the reliability and efficiency of WBExce.


    [44] Rhizome: A middle-ware for cloud vision computing framework:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6737832&pageNumber%3D3%26queryText%3Dcloud+computing


    Over the past decade, high performance applications have embraced parallel programming and computing models, like video analysis for surveillance purpose. However due to the heterogeneous, opaque and dynamic nature of cloud enviroment, existing Cloud parallel framework like Hadoop/HPCC (with Job-keeper + Map-reduce behind) approach is not suitable to perform vision computing specific task on the cloud. Rhizome is a middle-ware as PAAS & IASS for building specific cloud vision computing applications, so as to convert a high performance application to an elastic cloud one, which may enable effective high performance and robust parallel computing especially for streaming like task e.g. vision computing within the cloud environment. Rhizome encourages use of simple MoC based concurrency patterns that are easy to understand and implement correctly, and built on an agency-like model with declarative specification of persistence, replication, and consistency and using lightweight transactions in cloud OS environment to support the development of reliable and scalable client + cloud software. The experimental assessment demonstrates a superior performance of the cloud vision computing application in Hadoop with the help of Rhizome, which provides substantial and consistent better programming easiness and system robustness.


    [45] A survey on cloud enviroment resource allocation techniques:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6780076&pageNumber%3D3%26queryText%3Dcloud+computing


    cloud enviroment is a type of computing which can be considered as a new era of computing. Cloud can be considered as a rapidly emerging new paradigm for delivering computing as a utility. In cloud enviroment various cloud consumers demand variety of services as per their dynamically changing needs. So it is the job of cloud enviroment to avail all the demanded services to the cloud consumers. But due to the availability of finite resources it is very difficult for cloud providers to provide all the demanded services. From the cloud providers' perspective cloud resources must be allocated in a fair manner. So, it's a vital issue to meet cloud consumers' QoS requirements and satisfaction. This paper mainly addresses key performance issues, challenges and techniques for resource allocation in cloud enviroment. It also focuses on the key issues related to these existing resource allocation techniques and summarizes them.


    [46] The Characteristics of cloud enviroment:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=5599083&pageNumber%3D3%26queryText%3Dcloud+computing


    cloud enviroment emerges as one of the hottest topic in field of information technology. cloud enviroment is based on several other computing research areas such as HPC, virtualization, utility computing and grid computing. In order to make clear the essential of cloud enviroment, we propose the characteristics of this area which make cloud enviroment being cloud enviroment and distinguish it from other research areas. The cloud enviroment has its own conceptional, technical, economic and user experience characteristics. The service oriented, loose coupling, strong fault tolerant, business model and ease use are main characteristics of cloud enviroment. Clear insights into cloud enviroment will help the development and adoption of this evolving technology both for academe and industry.


    [47] Verification Requirements for Secure and Reliable cloud enviroment:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6686021&pageNumber%3D3%26queryText%3Dcloud+computing


    cloud enviroment has been widely adopted in a large variety of applications. This brings besides others also many new challenges in the fields of security and reliability. Like any other security and correctness sensitive computer system, it is beneficial to fully verify cloud solutions to ensure their correctness. Verification and validation of distributed systems has been widely studied, however, it has not been analyzed whether verification approaches in distributed systems can be directly applied to cloud enviroment or not. In this study, we present a comparison of verification requirements for distributed computing and cloud enviroment to establish the need of a specialized verification model/architecture for cloud enviroment. We differentiate the verification in distributed and cloud systems based on their business models, architecture models, programming models and security models. We argue that service level agreements (SLAs), which span across the cloud, become more critical in the verification process. Based on our study, we present an abstract verification model focusing specifically on cloud enviroment, paving the way to an implementation of a viable verification model which can practically verify complex cloud systems.


    [48] cloud enviroment for future generation of computing technology:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6392539&pageNumber%3D3%26queryText%3Dcloud+computing


    The emergence of cloud enviroment, envisioned as the future generation of computing model for its major advantages in on-demand self-service, ubiquitous network access, location independent resource pooling and transference of risk, has established a trend towards building massive, energy-hungry and geographically distributed data centers. It is the latest developments of computing models after distributed computing, parallel processing and grid computing. It achieves multi-level virtualization and abstraction through effective integration of variety of computing, storage, data, applications and other resources, users can be easy to use powerful computing and storage capacity of cloud enviroment only need to connect to the network. It can also concentrate all computation resources and manage automatically through the software without intervene. In this paper, we highlight the different aspects of cloud enviroment for finding the actuality of the future generation of commuting in the form of cloud enviroment after mainframe based computing, personal computing, client server based computing and web server based computing.


    [49] Capturing cloud enviroment Knowledge and Experience in Patterns:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6253572&pageNumber%3D3%26queryText%3Dcloud+computing


    The industry-driven evolution of cloud enviroment tends to obfuscate the common underlying architectural concepts of cloud offerings and their implications on hosted applications. Patterns are one way to document such architectural principles and to make good solutions to reoccurring (architectural) cloud challenges reusable. To capture cloud enviroment best practice from existing cloud applications and provider-specific documentation, we propose to use an elaborated pattern format enabling abstraction of concepts and reusability of knowledge in various use cases. We present a detailed step-by-step pattern identification process supported by a pattern authoring toolkit. We continuously apply this process to identify a large set of cloud patterns. In this paper, we introduce two new cloud patterns we identified in industrial scenarios recently. The approach aims at cloud architects, developers, and researchers alike to also apply this pattern identification process to create traceable and well-structured pieces of knowledge in their individual field of expertise. As entry point, we recap challenges introduced by cloud enviroment in various domains.


    [50 A survey and analysis of cloud model-based security for computing secure cloud bursting and aggregation in renal environment:


    http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6141288&pageNumber%3D3%26queryText%3Dcloud+computing


    cloud enviroment has emerged as a major information and communications technology trend and has been proved as a key technology for market development and analysis for the users of several field. The practice of computing across two or more data centers separated by the Internet is growing in popularity due to an explosion in scalable computing demands. However, one of the major challenges that faces the cloud enviroment is how to secure and protect the data and processes the data of the user. The security of the cloud enviroment environment is a new research area requiring further development by both the academic and industrial research associations. While cloud-bursting is addressing this process of scaling up and down across data centers. To provide secure and reliable services in cloud enviroment environment is an important issue. One of the security issues is how to reduce the impact of denial-of-service (DoS) attack or distributed denial-of-service (DDoS)in this environment. In this paper we survey several aspects of cloud enviroment and the security concerns and proposed a novel approach that is Cloud Bursting Brokerage and Aggregation (CBBA). In this approach we consider three clouds for bursting and aggregation operation. We also used secure sharing mechanism so that the cloud resources are shared among different cloud environment.


    More About Android Application


    What is cloud enviroment? Everyone is talking about “the cloud.” But what does it mean? Business applications are moving to the cloud. It’s not just a fad—the shift from traditional software models to the Internet has steadily gained momentum over the last 10 years. Looking ahead, the next decade of cloud enviroment promises new ways to collaborate everywhere, through mobile devices. Life before cloud enviroment Traditional business applications have always been very complicated and expensive. The amount and variety of hardware and software required to run them are daunting. You need a whole team of experts to install, configure, test, run, secure, and update them.When you multiply this effort across dozens or hundreds of apps, it’s easy to see why the biggest companies with the best IT departments aren’t getting the apps they need. Small and mid-sized businesses don’t stand a chance. cloud enviroment: a better way With cloud enviroment, you eliminate those headaches because you’re not managing hardware and software—that’s the responsibility of an experienced vendor like salesforce.com. The shared infrastructure means it works like a utility: You only pay for what you need, upgrades are automatic, and scaling up or down is easy.Cloud-based apps can be up and running in days or weeks, and they cost less. With a cloud app, you just open a browser, log in, customize the app, and start using it. Businesses are running all kinds of apps in the cloud, like customer relationship management (CRM), HR, accounting, and much more. Some of the world’s largest companies moved their applications to the cloud with salesforce.com after rigorously testing the security and reliability of our infrastructure.As cloud enviroment grows in popularity, thousands of companies are simply rebranding their non-cloud products and services as “cloud enviroment.” Always dig deeper when evaluating cloud offerings and keep in mind that if you have to buy and manage hardware and software, what you’re looking at isn’t really cloud enviroment but a false cloud. Cloud 2: Mobility and collaboration The latest innovations in cloud enviroment are making our business applications even more mobile and collaborative, similar to popular consumer apps like Facebook and Twitter. As consumers, we now expect that the information we care about will be pushed to us in real time, and business applications in the cloud are heading in that direction as well. With Cloud 2, keeping up with your work is as easy as keeping up with your personal life on Facebook. Definition of 'cloud enviroment' A model for delivering information technology services in which resources are retrieved from the internet through web-based tools and applications, rather than a direct connection to a server. Data and software packages are stored in servers. However, cloud enviroment structure allows access to information as long as an electronic device has access to the web. This type of system allows employees to work remotely. cloud enviroment is so named because the information being accessed is found in the "clouds", and does not require a user to be in a specific place to gain access to it. Companies may find that cloud enviroment allows them to reduce the cost of information management, since they are not required to own their own servers and can use capacity leased from third parties. Additionally, the cloud-like structure allows companies to upgrade software more quickly.As cloud services mature and add features, they increasingly overlap, signaling heightened competition in both the consumer and enterprise markets. Smaller cloud players must be nimble and adaptive to avoid getting trampled.The cloud is the latest battleground of the tech titans across the spectrum of enterprise and consumer business, but maturation, a desire for market hegemony and technology evolution naturally lead to new features and that means formerly disparate services are encroaching upon one another. Cloud services are the latest realm in the technology industry’s quest to build compelling, defensible and sticky ecosystems. As such, the dominant tech giants will continue to expand their reach and further intrude on each other’s turf in both the enterprise and consumer markets. The jostling will create plenty of news and be fun to watch, but smaller cloud players must be nimble and adaptive to avoid getting trampled.cloud enviroment is Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand, as with the electricity grid.cloud enviroment is a natural evolution of the widespread adoption of virtualization, Service-oriented architecture and utility computing. Details are abstracted from consumers, who no longer have need for expertise in, or control over, the technology infrastructure "in the cloud" that supports them. cloud enviroment describes a new supplement, consumption, and delivery model for IT services based on the Internet, and it typically involves over-the-Internet provision of dynamically scalable and often virtualized resources. It is a byproduct and consequence of the ease-of-access to remote computing sites provided by the Internet. This frequently takes the form of web-based tools or applications that users can access and use through a web browser as if it were a program installed locally .



    KaaShiv InfoTech offers world class Final Year Project for BE, ME, MCA ,MTech, Software engineering and other students in Anna Nagar, Chennai.

    internship in chennai



    Website Details:


    Inplant Training:


    http://inplant-training.org/
    http://www.inplanttrainingchennai.com/
    http://http://inplanttraining-in-chennai.com/

    Internship:


    http://www.internshipinchennai.in/
    http://www.kernelmind.com/
    http://www.kaashivinfotech.com/