Journal of Computer & Information Technology

Papers

Voulume: 7
Issue: 1
Journal Paper Splitter
Article No. 1
A Survey report on Security in Cloud Computing
VINITA KEER1, SYED IMRAN ALI2 and NEERAJ SHARMA3

1Research Scholar (CSE), Sagar Institute of Science Technology & Research (RGPV), Bhopal, (India)
2Head, Department of CSE Sagar Institute of Science Technology & Research (RGPV),Bhopal, (India)
3Assistant Prof.Computer science and egg.Sagar Institute of Science Technology & Research (RGPV),Bhopal, (India)
Email: vinitakeer@gmail.com

Abstract :

When we store our photos online instead of on our home computer, or use webmail or a social networking site, we are using a “cloud computing” service. Cloud computing is a model of servicedelivery and access where dynamically scalableand virtualized resources are provided as a serviceover the Internet.In this survey we focus on what is cloud computing, how to best use of cloud computing in data security.

The objective of this paper is to survey about various security techniques over cloud platform and show analysis of protection by using various cryptographic techniques which is most useful and helpful in the information security. The work is preceded with a goal to build a security approach at cloud end which will be provided with trusted regarding information storage at cloud end, and would lead to providing only information security and wouldn’t store any data in its system.

Keyword : Cloud Computing, Encryption, Network Security, Cryptography
DOI :
Download Count : 489
View Count : 324
Share
Facebook Twitter Google Plus LinkedIn Reddit
Journal Paper Splitter
Article No. 2
A Survey Report on VM scheduling and Consolidation in Cloud Computing
RAKESH KUMAR VISHWAKARMA1, SYED IMRAN ALI2 and ANIDRA KATIYAR3

1Computer Science Engineering Sagar Institute of Science, Technology and Research Bhopal (India)
2HOD,CSE Sagar Institute of Science, Technology and Research Bhopal (India)
3Assistant Professor Sagar Institute of Science, Technology and Research Bhopal (India)
Email:-rakeshvishwakarma045@gmail.com, talktoimranali@gmail.com, ani_katiyar@rediffmail.com

Abstract :

Cloud Computing is extremely new and helpful technology for networking world, it functions to cut back electronic waste and dealing setting in virtual platforms and centralized information storage options, it’s terribly advanced and new properties for storage, computer code readying and net primarily based platform services that helps lots to manage network setting in easiest method with safety features. To store data centrally VM placement MBFD technique is very new, and advanced technology which helps in cloud energy minimization. This paper presents a brief survey onVM scheduling and Consolidation in Cloud Computing.

Keyword : Cloud Computing, VM Scheduling, mbfd,energy minimization, server consoidation, resource optimization
DOI :
Download Count : 516
View Count : 317
Share
Facebook Twitter Google Plus LinkedIn Reddit
Journal Paper Splitter
Article No. 3
Hybrid Architecture for Query Optimizers Using Checkpoints with Plan Reduction Algorithms
DEEPIKA MALVIYA, SYED IMRAN ALI and ZOHA USMANI

Department of CSE, Sagar Institute of Science Technology and Research, Ratibad, Bhopal-462044 (M.P.) (India)
Email:-deepamalviya19@gmail.com

Abstract :

Query Optimization is an important component of all Database Systems. Designing optimizers which takes less search time yet provides the most optimal query execution plan has been a challenge for DBMS research community in the last decade. Most of the optimization techniques focus on the static compilation of selectivity of base relations. The cost of executing a plan depends heavily on selectivity which keeps changing frequently and thus static compilation provides an inconsistent performance. Adaptive query optimization is an excellent method of generating optimal plans consistently. This paper proposes new hybrid architecture for query optimizers which combine features of adaptive query processing and also reduces the search space for re optimization using reduced plan diagrams and cost diagrams. This hybrid architecture is bound to give more efficient performance as compared to any other optimization technique along with increased robustness and a substantial increase in consistency of selecting most optimal execution plan.

Keyword : Query Optimization, Selectivity, Plan Cardinality, Plan Diagrams, Checkpoints
DOI :
Download Count : 410
View Count : 397
Share
Facebook Twitter Google Plus LinkedIn Reddit
Journal Paper Splitter
Article No. 4
Dynamic Key Based Hybrid Encryption Method for Data Security in Cloud
RAM KINKER SHARMA1and M. A. RIZVI2

1M.Tech CTA NITTTR, Bhoapl (India)
2National Institute of Technical Teachers’ Training and Research, Bhopal (India)
Email:- ramkinkar2101@gmail.com   Email:- marizv@nitttrbpl.ac.in

Abstract :

The concept of Cloud-Computing can offers the framework in order assist the customers efficiently by adding more robust services also by applications via Internet. This type of computing mechanism is increasingly becoming popular as various types of enterprise implementation and data are moving into cloud platforms.In this major hurdle is to spread this concept of storage over cloud is shortage of trust among the users of this technology.In this system of cloud can be easily threatened by variouscyber-attacks, because most of the computing mechanisms need to contain the security approach in order to secure the virtual devices from the attacks.Also thispaper discussed about thesecurity concern of data which is send towards the remote server through channel or internet. By applying the cloud concept within the organizations, there is few security issues may also discussed.

Keyword : Data Security, cloud, DES,
DOI :
Download Count : 407
View Count : 299
Share
Facebook Twitter Google Plus LinkedIn Reddit
Journal Paper Splitter
Ansari Education And Research Society
Facebook Google Plus Twitter
Website developed by
main-banner