i-manager's Journal on Cloud Computing (JCC)


Volume 5 Issue 1 January - June 2018

Research Paper

Cloud Computing - A Source of the Entire Online Applications

D. R. Robert Joan*
Assistant Professor, Department of Mathematics Education, Christian College of Education, Marthandam, Tamilnadu, India.
Joan, D. R. R. (2018). Cloud Computing - A Source of the Entire Online Applications, i-manager's Journal on Cloud Computing, 5(1), 1-6. https://doi.org/10.26634/jcc.5.1.15106

Abstract

In this article, the author has discussed about the online applications, which are the resources of cloud computing. The cloud-computing is the style of reinstating conventional learning into applications given through the online that helps to reduce the expenses and duration of time spent for a purpose. Cloud computing supply virtualized hardware and software resources collectively. In addition, it provides various applications to fulfill the specific needs in education, business, travels, information gathering, etc. It gives amenities for customer to employ, organize, and handle their applications in their devices with the assist of online. Cloud computing situations replicate existent world with application's recital, steadiness, rapidity, and protection. Cloud computing is a vital renovation of innovative facility. Elearning and Web based virtual reality applications are solitary of this scenario, which are the resource of cloud computing. These are extensively practiced in education, virtual conferences, entertainment, practical, training courses, and so on. In modern days, many of them prefer e-learning situations to share information through online. Cloud computing was used by organizations to enter the current information from all over the globe in a fraction of second. In the side of instruction the educators and the pupils continuously renew their accumulation in the applications and it also stored in the cloud. Also cloud computing is an assortment of applications which may be entered and controlled by many benefiters. Therefore, in the present article, the author has discussed about cloud computing as a source of the entire online applications.

Research Paper

On Security of Information Access for Multi Expert Cloud Frameworks

Shaik Naseera* , Gopichand G.**, Bhanu Prakash Ande***
* Associate Professor, School of Computer Science and Engineering, Vellore Institute Technology, Vellore, Tamil Nadu, India.
** Assistant Professor, School of Computer Science and Engineering, Vellore Institute Technology, Vellore, Tamil Nadu, India.
*** Lecturer, Department of Computer Science and Engineering, Gambella University, Gambella, Ethiopia.
Naseera, S., Gopichand, G., Ande, B. P. (2018). On Security of Information Access for Multi Expert Cloud Frameworks, i-manager's Journal on Cloud Computing, 5(1), 7-11. https://doi.org/10.26634/jcc.5.1.15367

Abstract

Cloud computing has three types of services, mainly they are platform as service, software as service, and Infrastructure as service. So based on whatever the requirements they have, the consumers will select different services and try to use them. Securing the information in the cloud is the better way to access it. Cloud storage will have some different roles like data owner and the service who provides. Particular data owners will not interact with the different users. Now-a-days, the information access is one of the challenging tasks in the cloud storage. Cloud owner would not have fully trusted data owners. So for avoiding the untrusted servers of data by accessing very expressive information for that purposes, they will encrypt the data and so the user will have the valid keys, on whatever they expect to access the information. So in order to validate it they need a management scheme. In this paper, the authors have proposed an advanced attribute based encryption standard system to control the scrambled information. They have used Advanced Encryption standard algorithm for the encryption of secret keys. This approach demonstrated the performance of the services efficiently in a secured cloud environment.

Review Paper

A Comprehensive Review of Security Issues in Cloud Computing

Haider Ali* , Abul Hassan **, Komal Shahzadi***, Maryam Fatima****
*, ***, **** Student, BS Computer Science, The Superior College, Lahore, Pakistan.
** Faculty of Computing, The Superior College, Lahore, Pakistan.
Ali, H., Shahzadi, K., Fatima, M., Hassan, A. (2018). A Comprehensive Review of Security Issues in Cloud Computing, i-manager's Journal on Cloud Computing, 5(1), 12-19. https://doi.org/10.26634/jcc.5.1.15448

Abstract

The cloud computing in the world of IT industry has a huge value. It made things reliable and comfortable. As the number of consumers or customers are increasing on cloud computing they are dispatchers of their workload on it. Some different qualities make it unique from others like providing high resources in performance, providing huge space for data storage, etc. In this article, the authors briefly discuss about privacy and security in cloud computing, examining different techniques and methods for securing information and also their drawbacks. The purpose of this article is to understand the security issues and to defeat these events in parliamentary procedure to secure users' assets. In the result of this study, they were able to understand the issues and provide some new methods or algorithm to resolve these issues.

Review Paper

Internet of Things: A Review Article

Neeraj Kumar Rathore* , Farha Khan**
* Assistant Professor, Department Information Technology, Sri G.S. Institute of Technology & Science, Indore, Madhya Pradesh, India.
** Talent Search Specialist, Linkruit, Ahmedabad, Gujarat, India.
Rathore, N. K., Khan, F. (2018). Internet of Things: A Review Article, i-manager's Journal on Cloud Computing, 5(1), 20-25. https://doi.org/10.26634/jcc.5.1.14276

Abstract

The Internet of Things (IoT) is entering the daily operation of many sectors, but these technologies are not limited to smart technologies like Smart homes and physical security such as E-health, and logistics. The concept for developing the smart cities is emerging in different segments, where enhanced street lighting controls and infrastructure were developed. A number of deployment limiting issues currently impact the scope of IoT utilization include lack of comprehensive end to end standards. This paper reviews some of the technical challenges faced by IoT in the smart arena.

Survey Paper

Be Mindful of the Move: A Swot Analysis of Cloud Computing Towards the Democratization of Technology

Mboungou Mouyabi Seke*
CRM Officer, University of Witwatersrand, Johannesburg, South Africa.
Seke, M. M. (2018). Be Mindful of the Move: A Swot Analysis of Cloud Computing Towards the Democratization of Technology, i-manager's Journal on Cloud Computing, 5(1), 26-35. https://doi.org/10.26634/jcc.5.1.15070

Abstract

Extending the capabilities of technology and mobile applications through cloud services to a large audience remains one of the key factors of success in the last decade of the digital transformation. However, this paper examines the Strengths, Weaknesses, Opportunities, and Threats of Cloud Computing that provide credentials in an attempt to interrupt the silence of tangible transition occurring in the Information and Communication Technology landscape today through democratization. The paper has identified security issues to be both a threat and weakness to cloud computing while its strength resides in its elasticity and scalability. With the demonstration of its characteristics to be a disruptive technology, cloud computing has the potential of helping emerging markets reap the benefits of information technology without the substantial upfront investments that have hindered past efforts. In addition to this opportunity presented to emerging countries, the rapid strides created by cloud computing in all areas conveyed a malleable way of dealing with technology called democratization. The democratization of technology is the process by which access to technology continues to become easily available to more people through several devices, fixed and mobile. However, due to the quality method exuded in this paper, the opinion of the author does not necessary imply the view of other advocates and cloud-computing evangelists.