List of Journals    /    Call For Papers    /    Subscriptions    /    Login
 
 
 
 
 SEARCH
By Author By Title
 
 
ABOUT CSC
 About CSC Journals
 CSC Journals Objectives
 List of Journals
 CALL FOR PAPERS
 Call For Papers CFP
 Special Issue CFP
AUTHOR GUIDELINES
 Submission Guidelines
 Peer Review Process
 Helpful Hints For Getting Published
 Plagiarism Policies
 Abstracting & Indexing
 Open Access Policy
 Submit Manuscript
 FOR REVIEWERS
 Reviewer Guidelines
 FOR EDITORIAL
 Editor Guidelines
 Join Us As Editor
 Launch Special Issue
 Suggest New Journal
 CSC LIBRARY
 Browse CSC Library
 Open Access Policy
  SERVICES
 Conference Partnership Program (CPP)
 Abstracting & Indexing
 SUBSCRIPTIONS
 Subscriptions
 Discounted Packages
 Archival Subscriptions
 How to Subscribe
 Librarians
 Subscriptions Agents
 Order Form
 DOWNLOADS
 
 
 
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
Full text
 PDF(169.1KB)
Source 
International Journal of Computer Science and Security (IJCSS)
Table of Contents
Download Complete Issue    PDF(1.98MB)
Volume:  5    Issue:  4
Pages:  NULL
Publication Date:   September / October 2011
ISSN (Online): 1985-1553
Pages 
405 - 413
Author(s)  
Anil Gupta - India
Parag Pande - India
Aaftab Qureshi - India
Vaibhav Sharma - India
 
Published Date   
05-10-2011 
Publisher 
CSC Journals, Kuala Lumpur, Malaysia
ADDITIONAL INFORMATION
Keywords   Abstract   References   Cited by   Related Articles   Collaborative Colleague
 
KEYWORDS:   Cloud Computing, Security issues, Cloud Security, Cloud architecture 
 
 
This Manuscript is indexed in the following databases/websites:-
1. Academic Journals Database
2. Directory of Open Access Journals (DOAJ)
3. Bielefeld Academic Search Engine (BASE)
4. Google Scholar
5. Docstoc
 
 
Cloud Computing is the hottest technology in the market these days, used to make storage of huge amounts of data and information easier for organizations. Maintaining servers to store all the information is quite expensive for individual and organizations. Cloud computing allows to store and maintain data on remote servers that are managed by Cloud Service Providers (CSP) like Yahoo and Google. This data can then be accessed through out the globe. But as more and more information of individuals and companies is placed in the cloud, concerns are beginning to grow about just how safe an environment it is. In this paper we discussed security issues and requirements in the Cloud and possible solutions of some the problems. We develop an architecture model for cloud computing to solve the data availability and error correction problem. 
 
 
 
1 Anil Gupta, Aaftab Qureshi, Parag Pande,”Cloud Computing Characteristics and Service Models: our own interpretation”.
2 Kresimir Popovic, et al., “Cloud “Computing issues and challanges” MIPRO 2010 May 24-28 Opatija, Croatia, pp 344-349.
3 Gansen Zhao, et al., “Deployment Models: Towards Eliminating Security Concerns from Cloud Computing” IEEE 2010, pp 189-195.
4 J. Dean and S. Ghemawat. “Mapreduce: simplified data processing on large clusters”. Commun. ACM, 51(1):107–113, 2008.
5 Apache Hadoop, 2009. http://hadoop.apache.org/.
6 M. Isard, M. Budiu, Y. Yu, A. Birrell, and D. Fetterly.“Dryad: distributed data-parallel programs from sequential building blocks”. In EuroSys ’07: Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer Systems 2007, pages 59–72, New York, NY, USA, 2007. ACM.
7 Condor DAGman, 2009. http://www.cs.wisc.edu/condor/dagman/. [18] D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L. Youseff, and D. Zagorodnov. “The eucalyptus open-source cloud-computing system”. In Proceedings of Cloud Computing and Its Applications, October 2008.
8 Nimbus. “Introduction to nimbus”, 2009. http://workspace.globus.org/clouds/nimbus.html. [3] S. Beco, A. Maraschini, and F. Pacini. “Cloud computing and RESERVOIR project”. NUOVO CIMENTO DELLA SOCIETA ITALIANA DI FISICA C-COLLOQUIA ON PHYSICS, 32(2), Mar-Apr 2009.
9 CARMEN, 2009. http://www.carmen.org.uk/.
10 Å. A. Nyre and M. G. Jaatun. “Privacy in a semantic cloud: What’s trust got to do with it?”. In The First International Conference on Cloud Computing, pages 107–118, 2009.
11 S. Pearson, Y. Shen, and M. Mowbray. “A privacy manager for cloud computing”. In The First international Conference on Cloud Computing, pages 90–106, 2009.
12 L. Kaufman. “Data security in the world of cloud computing”. IEEE SECURITY & PRIVACY, 7(4), July- August 2009.
13 S. Creese, P. Hopkins, S. Pearson, and Y. Shen. “Data protection-aware design for cloud services”. In The First International Conference on Cloud Computing, pages 119–130, 2009.
14 L. Hu, S. Ying, X. Jia, and K. Zhao. “Towards an approach of semantic access control for cloud computing”. In The First International Conference on Cloud Computing, pages 145–156, 2009.
15 D. Chen, X. Huang, and X. Ren. “Access control of cloud service based on ucon”. In The First International Conference on Cloud Computing, pages 559–564, 2009.
16 T. Uemura, T. Dohi, and N. Kaio. “Availability analysis of a scalable intrusion tolerant architecture with two detection modes”. In The First International Conference on Cloud Computing, pages 178–189, 2009.
17 L. Yan, C. Rong, and G. Zhao. “Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography”. In The First International Conference on Cloud Computing, pages 167–177, 2009.
18 G. Zhao, J. Liu, Y. Tang, W. Sun, F. Zhang, X. ping Ye, and N. Tang. “Cloud computing: A statistics aspect of users”. In The First International Conference on Cloud Computing, pages 347–358. Springer, 2009.
19 M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. “Above the clouds: A Berkeley view of cloud computing”. Technical Report UCB/EECS- 2009-28, EECS Department, University of California, Berkeley, Feb 2009.
20 M. Schumacher, E. Fernandez, D. Hybertson, and F. Buschmann. SECURITY PATTERNS: INTEGRATING SECURITY AND SYSTEMS ENGINEERING. John Wiley & Sons, 2005.
21 T. Heyman, K. Yskout, R. Scandariato, and W. Joosen. “An analysis of the security patterns andscape”. In SESS ’07: Proceedings of the Third International Workshop on Software Engineering for Secure Systems, page 3, Washington, DC, USA, 2007. IEEE Computer Society.
22 E. B. Fernandez, J. Wu, M. M. Larrondo-Petrie, and Y. Shao. On building secure scada systems using security patterns. In CSIIRW ’09: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research, pages 1–4, New York, NY, USA, 2009. ACM.
23 B. Blakley and C. Heath. SECURITY DESIGN PATTERNS, 2004. The Open Group Security Forum.
24 K. J. Hughes. “Domain Based Security: enabling security at the level of applications and business processes”, 2002. www.qinetiq.com.
25 A. Singh, M. Srivatsa, and L. Liu. “Search-as-a-Service: Outsourced Search over Outsourced Storage”. ACM TRANSACTIONS ON THE WEB, 3(4), September 2009.
26 D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L. Youseff, and D. Zagorodnov. “The eucalyptus open-source cloud-computing system”. In Proceedings of Cloud Computing and Its Applications, October 2008.
27 S. Beco, A. Maraschini, and F. Pacini. “Cloud computing and RESERVOIR project”. NUOVO CIMENTO DELLA SOCIETA ITALIANA DI FISICA C-COLLOQUIA ON PHYSICS, 32(2), Mar-Apr 2009.
28 Wikipedia” www.wikipedia.org”.
 
 
 
 
 
 
1 Academia.edu
 
2 Search-Document
 
 
 
Anil Gupta : Colleagues
Parag Pande : Colleagues
Aaftab Qureshi : Colleagues
Vaibhav Sharma : Colleagues  
 
 
 
  Untitled Document
 
Copyrights (c) 2012 Computer Science Journals. All rights reserved.
Best viewed at 1152 x 864 resolution. Microsoft Internet Explorer.
 
  
 
Copyrights & Usage: Articles published by CSC Journals are Open Access. Permission to copy and distribute any other content, images, animation and other parts of this website is prohibited. CSC Journals has the rights to take action against individual/group if they are found victim of copying these parts of the website.