Friday, 6 September 2019

Performance Analysis and Evaluation of Multi-Cloud systems

Volume 6 Issue 1 January - June 2019

Research Paper

Performance Analysis and Evaluation of Multi-Cloud systems

R. Sugumar*, A. Rajesh**
* Department of Computer Science & Engineering, Sri Chandrashekarendra Saraswathi Viswa Maha Vidyalaya University, Kanchipuram, Tamil Nadu, India.
** C. Abdul Hakeem College of Engineering and Technology, Melvisharam, Vellore District, Tamil Nadu, India.
Sugumar, R., Rajesh, A.(2019). Performance Analysis and Evaluation of Multi-Cloud systems, i-manager's Journal on Cloud Computing, 6(1), 36-42. https://doi.org/10.26634/jcc.6.1.16201

Abstract

Many global enterprises are interested in involving their activities in mature multi-cloud strategies. To avail the resources from multiple public and private clouds concerning their purpose-specific cloud environments. Such a multi-cloud environment allows organizations and enterprises to manage their applications among various remote cloud providers. To proliferate the users/organizations, we present some of the existing multi-cloud environments to their optimization in such application centric. In this paper, we analyzed with CloudChekr– that makes the users analyze cloud resources use dependent on the summary and highlights. Simultaneously, it makes it simple as users monitor and analyze the cloud cost by giving highlights to cost designation, cloud optimization, invoicing and chargeback. The reports created and alert sent by CloudChekr even encourage individual/organizations to scale the cloud framework on time without expanding cloud cost in the Cloudchekr dashboard.Multcloud and Odrive a multicloud environment, a portal with different CSPs and also discussed with various aspects of storage, cost optimization, billing policies and security aspects in Multi-cloud environment. This will impact in increasingly users/organization to adopt multi-cloud strategies.

Privacy Preservation Guidelines Based Substance Distribution in Public Clouds

Volume 6 Issue 1 January - June 2019

Research Paper

Privacy Preservation Guidelines Based Substance Distribution in Public Clouds

S. Muthuraj Kumar *
Department of Computer Technology, MIT Campus, Anna University, Chennai, Tamil Nadu, India.
Kumar, S. M.(2019). Privacy Preservation Guidelines Based Substance Distribution in Public Clouds, i-manager's Journal on Cloud Computing, 6(1), 27-35. https://doi.org/10.26634/jcc.6.1.16160

Abstract

Cloud data storage has the biggest challenge on the maintenance of data integrity at untrusted servers. Cloud computing delivers cloud services such as databases, networking, etc. The service charge for cloud services is based on the usage of the services. Cloud databases provide facilities for large scale data storage and retrieval of distributed data. In order to provide effective data integrity and security, it is necessary to propose new storage and retrieval algorithms for cloud databases. The cloud storage provides a secure way to remotely store the important information. In Cloud data is stored on remote servers and retrieved from the any internet or cloud. Cloud Security consists of set of policies to protect data, applications and infrastructure of cloud computing. In proposed system, the secure cloud data distribution in clouds provides data confidentiality, truthfulness and data access control. The secure cloud data sharing method encrypts a data file with anonly encryption key. Two different key segments for everyone of the users are engendered, with the user only receiving one segment. Thereby, security level is increased in the cloud databases by using the privilege based hierarchy values.

Adoption of Cloud Computing in Palestinian Ministry of Telecommunication and Information Technology: A Framework Development

Volume 6 Issue 1 January - June 2019

Research Paper

Adoption of Cloud Computing in Palestinian Ministry of Telecommunication and Information Technology: A Framework Development

Ramiz Assaf*
Department of Industrial Engineering, University of Business and Technology, Jeddah, Saudi Arabia.
Assaf, R.(2019). Adoption of Cloud Computing in Palestinian Ministry of Telecommunication and Information Technology: A Framework Development, i-manager's Journal on Cloud Computing, 6(1), 19-26. https://doi.org/10.26634/jcc.6.1.15491

Abstract

In the information technology sector cloud computing has clearly become very strong driving force by taking over 90% of global enterprises using cloud as major part of their business. This study aims to introduce a comprehensive framework for the adoption of Cloud Computing and to determine the influencing factors in Palestinian Ministry of Telecommunication and Information Technology from point of view of employees from the ministry. Depending on two prominent frameworks: Technology-Organization-Environment framework and Diffusion of innovation framework. The researcher used the quantitative methodology to answer the research question and test the hypotheses. The questionnaire was delivered to the employees and received from 69 respondents from 75 disrupted survey. In order to evaluate the internal, convergent and discriminant validity of the instrument, validity and reliability tests of panel data were performed. The linear regression analysis was deployed to test the research hypotheses and come out with findings, recommendations and future to consider it when developing a framework to adopt Statistical analysis shows that there are some factors were rejected and other were accepted. The supported factors were: Competitive Pressure, External Support, Security, Top Management Support and Organization Readiness and the others are not significant.

A Dynamic Replication Mechanism in Data Grid Based on a Weighted Priority-based Scheme

Volume 6 Issue 1 January - June 2019

Research Paper

A Dynamic Replication Mechanism in Data Grid Based on a Weighted Priority-based Scheme

Mohammad Samadi Gharajeh*
Young Researchers and Elite Club, Tabriz Branch, Islamic Azad University, Tabriz, Iran.
Gharajeh, M. S.(2019). A Dynamic Replication Mechanism in Data Grid Based on a Weighted Priority-based Scheme, i-manager's Journal on Cloud Computing, 6(1), 9-18. https://doi.org/10.26634/jcc.6.1.15897

Abstract

Replication is one of the popular tools to determine the availability degree of resources (e.g., data files) in data grids. Since data grids involve limited file storages and high computing costs, replication process is very essential in these networks. This paper proposes a dynamic replication mechanism in a data grid that uses a weighted priority-based replication scheme, called WPRS. It specifies a value for existing each in a local storage based on three parameters including price, number of access time, and present time. When a resource is not available for a desired job, it is hired from other sites in the network. The proposed mechanism removes the file having the least value to increase the free space of data storage. Simulation results show that the proposed replication mechanism surpasses some of the existing replication methods in terms of the number of successful jobs, number of non successful jobs, and buy price.

A Taxonomy of Issues, Challenges and Applications in Internet of Multimedia Things (IoMMT)

Volume 6 Issue 1 January - June 2019

Article

A Taxonomy of Issues, Challenges and Applications in Internet of Multimedia Things (IoMMT)

G. Rama Subba Reddy*, M. Ajay kumar**, N. V. Kishore kumar***
* Department of Computer Science & Engineering, Mother Theresa Institute of Engineering & Technology, Palamaner, Andhra Pradesh, India.
** Department of Electronics and Communication Engineering, Chaitanya Bharathi Institute of Technology, Proddatur, Andhra Pradesh, India.
*** Department of Electrical and Electronics Engineering, Mother Theresa Institute of Engineering & Technology, Palamaner, Andhra Pradesh, India.
Reddy, G. R. S., Kumar, M. A., Kumar, N. V. K.(2019).A Taxonomy of Issues, Challenges and Applications in Internet of Multimedia Things (IoMMT), i-manager's Journal on Cloud Computing, 6(1), 1-8. https://doi.org/10.26634/jcc.6.1.16178

Abstract

In IoT technology, Multimedia big data which is said to be the large amount of data from multimedia devices will be generated with the fast growth of the multimedia gadgets. The IoT systems are failed in realizing the multimedia devices connectivity unless they are able in processing multimedia gadgets at a time. In contrast, earlier activities concerning research and development concentrate on the scaling strategies to sensor information gathered from many IoT gadgets. Nonetheless the present activities of development and the research do not made mandatory about the features of connectivity between the objects of multimedia. In this paper, we mainly concentrated on the above issue by considering the IoT concept and the advantages are taken to sight towards the IoMMT’s (Internet of Multimedia Things) vision. This paper describes the classification of computing the multimedia big data and also the challenges in models of multimedia computing along with the applications of IoT are discussed. . In addition to this we presented the taxonomy of Multimedia Things (MMT) along with the current research challenges like heterogeneity, reliability, scalability, and accessibility and Quality of Service requirements.


An Architectural Framework for Ant Lion Optimization-based Feature Selection Technique for Cloud Intrusion Detection System using Bayesian Classifier

Volume 5 Issue 2 July - December 2018

Survey Paper

An Architectural Framework for Ant Lion Optimization-based Feature Selection Technique for Cloud Intrusion Detection System using Bayesian Classifier

Haruna Atabo Christopher*, Jimoh Yakubu**, Shafi’i Muhammad Abdulhamid***, Abdulmalik D. Mohammed****
*-** PG Scholar, Department of Cyber Security Science, Federal University of Technology Minna, Nigeria.
*** Senior Lecturer and Head, Department of Cyber Security Science, Federal University of Technology Minna, Nigeria.
**** Research Scholar, University of Manchester, United Kingdom.
Christopher,H.A., Yakubu.J., Abdulhamid,S.M., Mohammed,A.D.(2018). An Architectural Framework for Ant Lion Optimization-based Feature Selection Technique for Cloud Intrusion Detection System using Bayesian Classifier, i-manager's Journal on Cloud Computing 5(2), 36-44. https://doi.org/10.26634/jcc.5.2.15691

Abstract

Cloud computing has become popular due to its numerous advantages, which include high scalability, flexibility, and low operational cost. It is a technology that gives access to shared pool of resources and services on pay per use and at minimum management effort over the internet. Because of its distributed nature, security has become a great concern to both cloud service provider and cloud users. That is why Cloud Intrusion Detection System (CIDS) has been widely used to the cloud computing setting, which detects and in some cases prevents intrusion. In this paper, the authors have proposed a conceptual framework that detects intrusion attacks within the cloud environment using Ant Lion Optimization (ALO) algorithm for feature selection and Bayesian Classifier. This framework is expected to detect cloud intrusion accurately at low computational cost and reduce false alert rate.

Data Quality Evaluation Framework for Big Data

Volume 5 Issue 2 July - December 2018

Review Paper

Data Quality Evaluation Framework for Big Data

Grace Amina Onyeabor *, Azman Ta’a**
*Lecturer Department of Information Science, University of Ibadan, Nigeria.
** Senior Lecturer, Department of Information Science, University of Ibadan, Nigeria.
Onyeabor,G.A., Ta’a,A.(2018). Data Quality Evaluation Framework for Big Data, i-manager's Journal on Cloud Computing 5(2), 27-35. https://doi.org/10.26634/jcc.5.2.15692

Abstract

Data is an important asset in all business organizations of today. Thus the results of its poor quality can be very grievous leading to erroneous insights. Therefore, Data Quality (DQ) needs to be evaluated before the analysis of any Big Data (BD). The evaluation of DQ in BD is challenging. Given the enormous datasets that are of varied format fashioned at a rapid speed, it is impossible to use the traditional methods of evaluating DQ in BD. Rather, there is a requirement of strategies and devices for the assessment and evaluation of DQ in BD in a rapid and more efficient manner. However, assessing the quality of data on the whole BD can be very expensive. In addition, there is also a need for improvement in data transformation activities of BD. This paper proposes a framework for DQ evaluation with the application of data sampling technique on BD sets from different data sources reducing the size of the data to samples representing the population of the BD sets. The Bag of Little Bootstrap (BLB) sampling technique will be used. The target Data Quality Dimensions (DQDs) to be used in this paper are completeness, consistency, and accuracy. In addition, the DQDs will be measured using different metric functions relevant to the DQDs. This will be done before and after an improved data transformation techniques to check the improvement of DQ in BD.

An Extended Min-Min Scheduling Algorithm in Cloud Computing

Volume 5 Issue 2 July - December 2018

Research Paper

An Extended Min-Min Scheduling Algorithm in Cloud Computing

J. Y. Maipan-uku*, A. Mishra**, A. Abdulganiyu***, A. Abdulkadir****
*,*** Lecturer, Department of Computer Science, Faculty of Natural Sciences, Ibrahim Badamasi Babangida University, Lapai (IBBUL), Niger State, Nigeria.
** Senior Lecturer, Department of Computer Science, Baze University, Abuja, Nigeria.
**** Lecturer, Department of Mathematics, Faculty of Natural Sciences, Ibrahim Badamasi Babangida University, Lapai (IBBUL), Niger State, Nigeria.
Maipan-uku,J.Y., Mishra.A.,Abdulganiyu.A.,Abdulkadir.A.(2018).An Extended Min-Min Scheduling Algorithm in Cloud Computing, i-manager's Journal on Cloud Computing 5(2), 20-26. https://doi.org/10.26634/jcc.5.2.15693

Abstract

Cloudlet scheduling seems to be the most fundamental problem of cloud computing as per Infrastructure as a Service (IaaS). Proper scheduling in cloud lead to load balancing, minimization of makespan, and adequate resources utilization. To meet consumers' expectations, the execution of cloudlet simultaneously is required. Many algorithms have been implemented to solve the cloud scheduling problem. This include Min-Min which gave priority to cloudlet with minimum completion time. Min-Min scheduling algorithm has two clear weaknesses; a high value of makespan being generated and low resource utilization. To address these problems, this research proposes an Extended Min-Min Algorithm which assigns cloudlet base on the differences between maximum and minimum execution time of cloudlets. CloudSim was used to implement and compare the performances of the proposed algorithm with the benchmarks. The results of the extensive experiments show that the proposed algorithm is able to perform better in terms of makespan minimization compared to the existing heuristics.

Inter-Agent Coordinated Security Model for Cloud Based Virtual Machines

Volume 5 Issue 2 July - December 2018

Research Paper

Inter-Agent Coordinated Security Model for Cloud Based Virtual Machines

E. C. Onuoha*, O. P. Akomolafe **
* Lecturer, Federal Polytechnic, Bida, Nigeria.
** Lecturer, Department of Computer Science, University of Ibadan, Ibadan, Nigeria.
Onuoha,E.C., Akomolafe,O.P.(2018).Inter-Agent Coordinated Security Model for Cloud Based Virtual Machines, i-manager's Journal on Cloud Computing 5(2), 11-19. https://doi.org/10.26634/jcc.5.2.15688

Abstract

For a user who desires to utilize the services of the cloud, security is not negotiable. Cloud Service Providers (CSPs) have security features that help protect user's data and information. These features are however not comprehensive. The Service Level Agreement (SLA) of most CSPs have certain exclusions that warrant users to undertake some measures of security upon themselves, especially for tenants having Virtual Machines (VM) in a multi-tenant architecture. This means that users who are ignorant of the security implications might be exposed to great risks. This paper presents a security model that used the OPNET (Optimized Network Engineering Tools) modeler, based on distributed agents, to prevent attacks from rogue virtual machine and enhance security of VM-to-VM communication. A set of mobile devices were given varying levels of access and pitched against some servers. Observing the packet network delays, phase response time for security apps and the coordination between these mobile devices and the installed agents on the servers showed that data belonging to tenants are safer and attacks from virtual machines are almost negligible.

Development of Blowfish Encryption Scheme for Secure Data Storage in Public and Commercial Cloud Computing Environment

Volume 5 Issue 2 July - December 2018

Research Paper

Development of Blowfish Encryption Scheme for Secure Data Storage in Public and Commercial Cloud Computing Environment

Shafi’i Muhammad Abdulhamid*, Nafisat Abubakar Sadiq**, Abdullahi Mohammed ***, Nadim Rana****, Haruna Chiroma*****, Emmanuel Gbenga Dada ******
* Senior Lecturer and Head, Department of Cyber Security Science, Federal University of Technology Minna, Nigeria.
** Graduate, Department of Computer Science, Federal University of Technology (FUT), Minna, Nigeria.
*** Lecturer, Department of Computer Science, Ahmadu Bello University Zaria-Nigeria.
**** Senior Lecturer, College of Computer Science and Information Systems, Jazan University, Jazan, Kingdom of Saudi Arabia.
***** Senior Lecturer, Department of Computer Science, Federal College of Education (Technical), Gombe, Nigeria.
****** Faculty, Department of Computer Engineering, University of Maiduguri, Maiduguri, Nigeria.
Abdulhamid, S. M., Sadiq, N. A., Abdullahi, M., Rana, N., Chiroma, H., Dada, E.G (2018). Development of Blowfish Encryption Scheme for Secure Data Storage in Public and Commercial Cloud Computing Environment, i-manager's Journal on Cloud Computing 5(2), 1-10. https://doi.org/10.26634/jcc.5.2.15690

Abstract

Cloud computing is defined as the delivery of on-demand computing resources ranging from infrastructure application to datacenter over the internet on a pay-per-use basis. Most cloud computing applications does not guarantee high level security, such as privacy, confidentiality, and integrity of data because of third-party transition. This brings the development of Blowfish cloud encryption system that enables them to encrypt their data before storage in the cloud. Blowfish encryption scheme is a symmetric block cipher used to encrypt and decrypt data. Microsoft Azure cloud server was used to test the proposed encryption system. Users are able to encrypt their data and obtain a unique identification to help them retrieve encrypted data from the cloud storage facility as and when needed.

Be Mindful of the Move: A Swot Analysis of Cloud Computing Towards the Democratization of Technology

Survey Paper

Be Mindful of the Move: A Swot Analysis of Cloud Computing Towards the Democratization of Technology

Mboungou Mouyabi Seke*
CRM Officer, University of Witwatersrand, Johannesburg, South Africa.
Seke, M. M. (2018). Be Mindful of the Move: A Swot Analysis of Cloud Computing Towards the Democratization of Technology, i-manager's Journal on Cloud Computing, 5(1), 26-35. https://doi.org/10.26634/jcc.5.1.15070

Abstract

Extending the capabilities of technology and mobile applications through cloud services to a large audience remains one of the key factors of success in the last decade of the digital transformation. However, this paper examines the Strengths, Weaknesses, Opportunities, and Threats of Cloud Computing that provide credentials in an attempt to interrupt the silence of tangible transition occurring in the Information and Communication Technology landscape today through democratization. The paper has identified security issues to be both a threat and weakness to cloud computing while its strength resides in its elasticity and scalability. With the demonstration of its characteristics to be a disruptive technology, cloud computing has the potential of helping emerging markets reap the benefits of information technology without the substantial upfront investments that have hindered past efforts. In addition to this opportunity presented to emerging countries, the rapid strides created by cloud computing in all areas conveyed a malleable way of dealing with technology called democratization. The democratization of technology is the process by which access to technology continues to become easily available to more people through several devices, fixed and mobile. However, due to the quality method exuded in this paper, the opinion of the author does not necessary imply the view of other advocates and cloud-computing evangelists.

Internet of Things: A Review Article

Volume 5 Issue 1 January - June 2018

Review Paper

Internet of Things: A Review Article

Neeraj Kumar Rathore*, Farha Khan**
* Assistant Professor, Department Information Technology, Sri G.S. Institute of Technology & Science, Indore, Madhya Pradesh, India.
** Talent Search Specialist, Linkruit, Ahmedabad, Gujarat, India.
Rathore, N. K., Khan, F. (2018). Internet of Things: A Review Article, i-manager's Journal on Cloud Computing, 5(1), 20-25. https://doi.org/10.26634/jcc.5.1.14276

Abstract

The Internet of Things (IoT) is entering the daily operation of many sectors, but these technologies are not limited to smart technologies like Smart homes and physical security such as E-health, and logistics. The concept for developing the smart cities is emerging in different segments, where enhanced street lighting controls and infrastructure were developed. A number of deployment limiting issues currently impact the scope of IoT utilization include lack of comprehensive end to end standards. This paper reviews some of the technical challenges faced by IoT in the smart arena.

A Comprehensive Review of Security Issues in Cloud Computing

Volume 5 Issue 1 January - June 2018

Review Paper

A Comprehensive Review of Security Issues in Cloud Computing

Haider Ali*, Abul Hassan **, Komal Shahzadi***, Maryam Fatima****
*, ***, **** Student, BS Computer Science, The Superior College, Lahore, Pakistan.
** Faculty of Computing, The Superior College, Lahore, Pakistan.
Ali, H., Shahzadi, K., Fatima, M., Hassan, A. (2018). A Comprehensive Review of Security Issues in Cloud Computing, i-manager's Journal on Cloud Computing, 5(1), 12-19. https://doi.org/10.26634/jcc.5.1.15448

Abstract

The cloud computing in the world of IT industry has a huge value. It made things reliable and comfortable. As the number of consumers or customers are increasing on cloud computing they are dispatchers of their workload on it. Some different qualities make it unique from others like providing high resources in performance, providing huge space for data storage, etc. In this article, the authors briefly discuss about privacy and security in cloud computing, examining different techniques and methods for securing information and also their drawbacks. The purpose of this article is to understand the security issues and to defeat these events in parliamentary procedure to secure users' assets. In the result of this study, they were able to understand the issues and provide some new methods or algorithm to resolve these issues.

On Security of Information Access for Multi Expert Cloud Frameworks

Volume 5 Issue 1 January - June 2018

Research Paper

On Security of Information Access for Multi Expert Cloud Frameworks

Shaik Naseera*, Gopichand G.**, Bhanu Prakash Ande***
* Associate Professor, School of Computer Science and Engineering, Vellore Institute Technology, Vellore, Tamil Nadu, India.
** Assistant Professor, School of Computer Science and Engineering, Vellore Institute Technology, Vellore, Tamil Nadu, India.
*** Lecturer, Department of Computer Science and Engineering, Gambella University, Gambella, Ethiopia.
Naseera, S., Gopichand, G., Ande, B. P. (2018). On Security of Information Access for Multi Expert Cloud Frameworks, i-manager's Journal on Cloud Computing, 5(1), 7-11. https://doi.org/10.26634/jcc.5.1.15367

Abstract

Cloud computing has three types of services, mainly they are platform as service, software as service, and Infrastructure as service. So based on whatever the requirements they have, the consumers will select different services and try to use them. Securing the information in the cloud is the better way to access it. Cloud storage will have some different roles like data owner and the service who provides. Particular data owners will not interact with the different users. Now-a-days, the information access is one of the challenging tasks in the cloud storage. Cloud owner would not have fully trusted data owners. So for avoiding the untrusted servers of data by accessing very expressive information for that purposes, they will encrypt the data and so the user will have the valid keys, on whatever they expect to access the information. So in order to validate it they need a management scheme. In this paper, the authors have proposed an advanced attribute based encryption standard system to control the scrambled information. They have used Advanced Encryption standard algorithm for the encryption of secret keys. This approach demonstrated the performance of the services efficiently in a secured cloud environment.


Cloud Computing - A Source of the Entire Online Applications

Volume 5 Issue 1 January - June 2018

Research Paper

Cloud Computing - A Source of the Entire Online Applications

D. R. Robert Joan*
Assistant Professor, Department of Mathematics Education, Christian College of Education, Marthandam, Tamilnadu, India.
Joan, D. R. R. (2018). Cloud Computing - A Source of the Entire Online Applications, i-manager's Journal on Cloud Computing, 5(1), 1-6. https://doi.org/10.26634/jcc.5.1.15106

Abstract

In this article, the author has discussed about the online applications, which are the resources of cloud computing. The cloud-computing is the style of reinstating conventional learning into applications given through the online that helps to reduce the expenses and duration of time spent for a purpose. Cloud computing supply virtualized hardware and software resources collectively. In addition, it provides various applications to fulfill the specific needs in education, business, travels, information gathering, etc. It gives amenities for customer to employ, organize, and handle their applications in their devices with the assist of online. Cloud computing situations replicate existent world with application's recital, steadiness, rapidity, and protection. Cloud computing is a vital renovation of innovative facility. Elearning and Web based virtual reality applications are solitary of this scenario, which are the resource of cloud computing. These are extensively practiced in education, virtual conferences, entertainment, practical, training courses, and so on. In modern days, many of them prefer e-learning situations to share information through online. Cloud computing was used by organizations to enter the current information from all over the globe in a fraction of second. In the side of instruction the educators and the pupils continuously renew their accumulation in the applications and it also stored in the cloud. Also cloud computing is an assortment of applications which may be entered and controlled by many benefiters. Therefore, in the present article, the author has discussed about cloud computing as a source of the entire online applications.

Improving the Performance of KNN Classification Algorithms by Using Apache Spark

Volume 4 Issue 2 July - December 2017

Research Paper

Improving the Performance of KNN Classification Algorithms by Using Apache Spark

B. Rajesh*, Asadi Srinivasulu**
* M.Tech Scholar, Department of Software Engineering, Jawaharlal Nehru Technological University Ananthapur, Andhra Pradesh, India.
**Associate Professor, Department of Information Technology, Sree Vidyanikethan Engineering College, Andhra Pradesh, India.
Rajesh, B.., and Srinivasulu, A. (2017). Improving the Performance of KNN Classification Algorithms by Using Apache Spark. i-manager's Journal on Cloud Computing, 4(2), 23-32. https://doi.org/10.26634/jcc.4.2.14382

Abstract

Data mining and machine learning are the most interesting research areas which find meaningful information from the large amount of data available, and converts into understandable form for further use. Diabetes is one of the growing diseases all over the world. Health trade professionals desire a reliable prediction system to diagnose polygenic disease. Tools and techniques available will be used to find the appropriate approaches and methods for classification of diabetes and in extracting valuable pattern. The Spark software was employed as a mining tool for diagnosing diabetes. Thus, using the spark, the performance of KNN Classification can be improved.

LiDAR Point Cloud 3D Attribute Extraction and Development of PCL Based Visualization Interface

Volume 4 Issue 2 July - December 2017

Research Paper

LiDAR Point Cloud 3D Attribute Extraction and Development of PCL Based Visualization Interface

Teh Peh Chiong*, Lai Koon Chun **, Adrian Teo Wei Hong ***, Ng Kok Leong ****, Ong Chu En *****
* Assistant Professor, Department of Electronic Engineering, Universiti Tunku Abdul Rahman, Malaysia.
** Assistant Professor in the Department of PetroChemical Engineering, Universiti Tunku Abdul Rahman, Malaysia.
*** Engineer, Universiti Tunku Abdul Rahman, Malaysia
****_***** Research Assistant, Universiti Tunku Abdul Rahman, Malaysia.
Chiong, T. P., Leong, N. K., En, O. C., Chun, L. K., and Hong, A. T. W. (2017). LiDAR Point Cloud 3D attribute extraction and development of PCL based visualization interface. i-manager's Journal on Cloud Computing, 4(2), 15-22. https://doi.org/10.26634/jcc.4.2.14250

Abstract

Handling LiDAR data have been growing ever since the high demand in automotive vehicle and surveillance system application. This paper introduces a conversion tool which allows the extraction of point cloud data while rearranging the data to fit Point Cloud Library (PCL) input format which is known as point cloud data (PCD). Scanse Sweep LiDAR is used as an initial guidance in LiDAR data acquisition where it is able to export .csv and .xyz data. Conversion such as cartesian to polar have also been included due to Scanse Sweep hardware .csv format is arranged in polar form. Moreover, converted point cloud is processed using PCL greedy fast triangulation method for 3D modelling and random sample consensus (RANSAC) algorithm used for plane segmentation which each features are combined in a single application constructed using LabVIEW.

An Introduction to World Leading CRM: SalesForce.com

Volume 4 Issue 2 July - December 2017

Article

An Introduction to World Leading CRM: SalesForce.com

Harshi Garg*, Uma kumari**
* M.Tech Scholar, College of Engineering and Technology, Mody University of Science and Technology(MUST), Rajasthan, India.
** Assistant Professor, College of Engineering and Technology, Mody University of Science and Technology (MUST), Rajasthan, India
Garg, H., and Kumari, U. (2017). An Introduction to World Leading CRM: SalesForce.com. i-manager's Journal on Cloud Computing, 4(2), 9-14. https://doi.org/10.26634/jcc.4.2.14579

Abstract

In the today’s world where every single person wants to keep their data secure, everyone is switching from their IT setups to cloud. Salesforce.com is the platform which is based on cloud computing which enables us in replacing the existing traditional system where software applications are installed on computer hardware. This paper proposed how the Force.com platform has been changed the traditional system into a world leading CRM. There are numerous reasons which makes IT giants that they should move towards Force.com platform. Salesforce.com is the world leading cloud provider having number of different features one can learn. This paper mainly focuses on the important aspects of Force.com platform. Some of the features are still new to the developer. The proposed work is done to make developer familiar with the editions and versions of this platform. With each release some new features are added to enhance the functionality of the platform.

Cloud Computing Security Threats and Solutions

Volume 4 Issue 2 July - December 2017

Article

Cloud Computing Security Threats and Solutions

Stefan Henry*, Md Liakat Ali**
* UG Scholar, Caldwell University, New Jersey, United States.
** Assistant Professor of Computer Science, United States.
Henry, S., Ali, M. L. (2017). Cloud Computing Security Threats and Solutions. i-manager's Journal on Cloud Computing, 4(2), 1-8. https://doi.org/10.26634/jcc.4.2.14249

Abstract

The continued evolution of technology has led to a vast virtualized network of unlimited possibilities; cloud computing. Cloud computing is an internet based service that offers cloud storage, online storage, to clients. With the use of software applications, providers create an end user virtual application that provides the user with software resources along with the necessary hardware components needed to keep all data secured. Clients are given the choice of three service models when purchasing cloud service; Software as a Service, Platform as a Service, and Infrastructure as a Service. In all cloud servers, there are four different deployment models of cloud systems; the public cloud, private cloud, the hybrid cloud and the community cloud. When it comes to the use of cloud systems, even though there are large amount of advantages there are equally a large amount of serious risks that if left unchecked, could lead to serious implications to the user’s data and the provider’s cloud service. Because of the complexity of cloud computing, developing quality security measures is highly challenging. This paper provides a background on what cloud computing is; it dives into details of the service models, the deployment models, what the threats and risks are. This paper also offers notable solutions to combat the increasing threats against cloud systems.

Checkpointing: Fault Tolerance Mechanism

Volume 4 Issue 1 January - June 2017

Survey Paper

Checkpointing: Fault Tolerance Mechanism

Neeraj Kumar Rathore*
Assistant Professor, Department of Computer Science & Engineering, Jaypee University of Engineering & Technology, Guna, M.P., India.
Rathore. N (2017). Checkpointing: Fault Tolerance Mechanism. i-manager's Journal on Cloud Computing, 4(1), 28-34. https://doi.org/10.26634/jcc.4.1.13756

Abstract

Checkpointing is a technique for inserting fault tolerance into computing systems. It basically consists on storing a snapshot of the current application state, and uses it for restarting the execution in case of failure. It is saving the program state, usually to stable storage, so that it may be reconstructed later in time. Checkpointing provides the backbone for rollback recovery (fault-tolerance), playback debugging, process migration, and job swapping. It mainly focuses on fault-tolerance, process migration, and the performance of checkpointing on all computational platforms from uniprocessors to supercomputers.
Checkpointing and restart has been one of the most widely used techniques for fault tolerance in large parallel applications. By periodically saving application status to permanent storage (disk or tape), the execution can be restarted from the last checkpoint if system faults occur. It is an effective approach to tolerating both hardware and software faults. For example, a user who is writing a long program at a terminal can save the input buffer occasionally to minimize the rewriting caused by failures that affect the buffer.

Cloud Manufacturing-A Boon for Manufacturing SMEs

Volume 4 Issue 1 January - June 2017

Survey Paper

Cloud Manufacturing-A Boon for Manufacturing SMEs

Subramaniam Arunachalam*, Roselin Sophia Francis Xavier**, Aloysius A. Edohis***
* Senior Lecturer, Mechanical Engineering Group, University of East London, UK.
** PhD Student, University of East London, UK.
*** Senior Lecturer, Department of Computer Science, School of Architecture, Computing & Engineering, University of East London, UK.
Arunachalam. S., Xavier. R. S. F. K., and Aloysius A. Edohis (2017). Cloud Manufacturing-A Boon for Manufacturing SMEs. i-manager's Journal on Cloud Computing, 4(1), 23-27. https://doi.org/10.26634/jcc.4.1.13755

Abstract

Automotive Manufacturing organizations constantly innovate to compete and sustain competitive advantage. In the past couple of decades, the manufacturing industry has been using management strategies and practices like Six Sigma, Lean Manufacturing, Total Quality Management, Agile Manufacturing, and Just-in-Time. However, in the recent times, cloud computing has begun to make waves in the manufacturing environment, to improve the efficiency of the manufacturing business processes. This paper discusses advantages of the new manufacturing model called 'Cloud Manufacturing' and analyses its benefits for the SMEs s to achieve reliable, economic manufacturing resources at lower cost, and thereby provide a fast, high quality, and low cost product manufacture.

HABCO: A Hybrid Algorithm to Improve Load Balancing in Cloud Computing

Volume 4 Issue 1 January - June 2017

Research Paper

HABCO: A Hybrid Algorithm to Improve Load Balancing in Cloud Computing

K. Tamilarasi*, V. Ramya**
** M.Phil Scholar, Department of Computer Science, Government Arts College for Men, Nandanam, Chennai. India
*** Assistant Professor, Department of Computer Science, Government Arts College for Men, Nandanam, Chennai, India.
Tamilarasi. K., and Ramya, V. (2017). HABCO: A Hybrid Algorithm to Improve Load Balancing In Cloud Computing. i-manager's Journal on Cloud Computing, 4(1), 15-22. https://doi.org/10.26634/jcc.4.1.13754

Abstract

Cloud Computing is known to be a well emerged architecture in recent times that tends to satisfy all the aspirations of entrepreneurs and researchers on a variety of fields. In the modern era we find large volume of data in different forms to be stored on cloud and multiple requests are triggered for resources, thus increasing load on servers sometimes unable to provide all the available resources on required time. This piece of research work designs a hybrid algorithm that is framed by combining the characteristics of two load balancing algorithms. Hybrid Ant Bee Colony optimization algorithm is a new phase in the field of load balancing on cloud computing that implements the characteristics real ants and bees. The searching of food source of an ant and searching of honey hive of bee resembles the searching of nodes in task scheduling. The algorithm designed implements the Ant colony optimization concept that corresponds updating pheromone table. Frequently updating the Pheromone table improves the performance of load balancing, the magnitude of pheromone deposited in the path of food source and also the fitness value calculation of the bees helps in identifying the best hive of bees. The works draw a different perspective by calculating the waiting time for a node to get allocated by a new task. It assures the improvement in performance of the system when HABCO is implemented as the node undergoes less waiting time.

Implementing Preserved Access of Cloud Networking

Volume 4 Issue 1 January - June 2017

Research Paper

Implementing Preserved Access of Cloud Networking

Kaki Leela Prasad*, Pilaka Anusha**
*-** Assistant Professor, Vignan's Institute of Information Technology, Visakhapatnam, India.
Prasad. K., and Anusha. P (2017). Implementing Preserved Access of Cloud Networking. i-manager's Journal on Cloud Computing, 4(1), 8-14. https://doi.org/10.26634/jcc.4.1.13753

Abstract

Cloud computing is an emerging technology for providing Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Security-as-a-Service (SaaS), which offers reduced capital expenditure, maintenance, complexity and we require a new security mechanism for distributed computing and server client computing. In this scenario, the authors have proposed a “Preserved access for cloud networking” that supports anonymous authentication for security issues. In this scheme, cloud performs some verification procedure to validate the authenticity of user and also has an added feature of access control in which only valid user can able to decrypt the stored data and also prevent replay attacks. Also they have addressed another important feature called user revocation when any user performs malicious operations on stored data.

An Analysis of Energy Efficiency and Traffic Using Cloud Computing in Portable Devices

Volume 4 Issue 1 January - June 2017

Article

An Analysis of Energy Efficiency and Traffic Using Cloud Computing in Portable Devices

Praful Saxena*, Sandeep Kumar Sharma**, Neeraj Kumar Verma***
*-** Senior Faculty, iNurture Education Solutions Pvt Ltd, Bengaluru, India.
*** Assistant Professor, Teerthankar Mahaveer University, Moradabad, India.
Saxena. P., Sharma. S. K., and Verma. N. K (2017). An Analysis of Energy Efficiency and Traffic Using Cloud Computing in Portable Devices. i-manager's Journal on Cloud Computing, 4(1), 1-7. https://doi.org/10.26634/jcc.4.1.13752

Abstract

Cloud computing is the storing, processing and management of applications, data and programs using the Internet and not through the hard drive of a personal computer. With cloud computing, organisations can store large amount of data efficiently and access them with great ease. The pay-as-you-go cloud model allows enterprises, both big and small to enjoy enhanced cost savings and better agility. This paper will introduce you to the fundamental concepts of cloud computing.

Information Replication in Cloud Computing Datacenters Using Most Efficient Overall Performance and Safety

Volume 3 Issue 4 August - October 2016

Research Paper

Information Replication in Cloud Computing Datacenters Using Most Efficient Overall Performance and Safety

M. Saraswathi Mani*, V. Ramya**
* Research Scholar, Department of Computer Science, Government College (Autonomous), Nandanam, Chennai, India.
** Assistant Professor, Department of Computer Science, Government College (Autonomous), Nandanam, Chennai, India.
Mani. S. M., and Ramya. V. (2016). Information Replication In Cloud Computing Datacenters Using Most Efficient Overall Performance And Safety. i-manager’s Journal on Cloud Computing, 3(4), 26-33. https://doi.org/10.26634/jcc.3.4.13596

Abstract

The online records storage, a cloud utility wishes clients to move the records in cloud's virtualized and shared environment to be able to end in numerous safety issues. Pooling, a property of a cloud, permits the resources (assets) to be shared among numerous clients. Moreover, the shared assets are additionally reassigned to various users at a few occurrence of them, which can gradually end in an information compromise through data recovery methodologies. Multi-tenant virtualized surroundings could likely result in a VM to urge away the bounds of virtual tool screen (VM). The open VM can intervene with entirely different VM to get entry to unauthorized data. In addition, multi-tenant virtualized network gets right to entry for flexible data privacy and integrity. Additionally, to improve the retrieval time; the information is fragmented over the nodes. The results of the simulations explain protection and performance have resulted in increased security level of information.