SlideShare a Scribd company logo
June 2020: Top Read Articles
in Advanced Computing
Advanced Computing: An International
Journal (ACIJ)
ISSN: 2229 - 6727 [Online]; 2229 - 726X [Print]
http://airccse.org/journal/acij/acij.html
SECURE CLOUD ARCHITECTURE
Kashif Munir1
and Prof Dr. Sellapan Palaniappan2
1
School of Science and Engineering, Malaysia University of Science and Technology, Selangor,
Malaysia
2
School of Science and Engineering, Malaysia University of Science and Technology, Selangor,
Malaysia
ABSTRACT
Cloud computing is set of resources and services offered through the Internet. Cloud services are
delivered from data centers located throughout the world. Cloud computing facilitates its
consumers by providing virtual resources via internet. The biggest challenge in cloud computing
is the security and privacy problems caused by its multi-tenancy nature and the outsourcing of
infrastructure, sensitive data and critical applications. Enterprises are rapidly adopting cloud
services for their businesses, measures need to be developed so that organizations can be assured
of security in their businesses and can choose a suitable vendor for their computing needs. Cloud
computing depends on the internet as a medium for users to access the required services at any
time on pay-per-use pattern. However this technology is still in its initial stages of development,
as it suffers from threats and vulnerabilities that prevent the users from trusting it. Various
malicious activities from illegal users have threatened this technology such as data misuse,
inflexible access control and limited monitoring. The occurrence of these threats may result into
damaging or illegal access of critical and confidential data of users. In this paper we identify the
most vulnerable security threats/attacks in cloud computing, which will enable both end users
and vendors to know a bout the k ey security threats associated with cloud computing and
propose relevant solution directives to strengthen security in the Cloud environment. We also
propose secure cloud architecture for organizations to strengthen the security.
KEYWORDS
Cloud Computing; Security and Privacy; Threats, Vulnerabilities, Secure Cloud Architecture.
For More Details : http://airccse.org/journal/acij/papers/4113acij02.pdf
Volume Link : http://airccse.org/journal/acij/vol4.html
REFERENCES
[1] "Swamp Computing" a.k.a. Cloud Computing". Web Security Journal. 2009-12-28. Retrieved 2010-
01-25.
[2] "Thunderclouds: Managing SOA-Cloud Risk", Philip Wik". Service Technology Magazine. 2011-10.
Retrieved 2011-21-21.
[3] What cloud computing really means. InfoWorld. http://www.infoworld.com/d/cloudcomputing/what-
cloud-computing-really-means-031?page=0,0
[4] Mell P, Grance T (2011) The nist definition of cloud computing (draft).
http://csrc.nist.gov/publications/drafts/800–145/Draft-SP-800-145_cloud-definition.pdf
[5] Ponemon (2011) Security of cloud computing providers study. http://www.ca.com/~/media/Files/
IndustryResearch/security-of-cloud-computing-providers-final-april-2011.pdf
[6] Software as a service-Wikipedia. Wikipedia. http://en.wikipedia.org/wiki/Software_as_a_service
[7] A. Tripathi and A. Mishra, “Cloud computing security considerations” IEEE Int. conference on
signalprocessing, communication and computing (ICSPCC), 14-16 Sept., Xi'an, Shaanxi, China, 2011
[8] Vadym Mukhin, Artem Volokyta, “Security Risk Analysis for Cloud Computing Systems” The 6th
IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems:
Technology and Applications, Prague, Czech Republic, 15-17 September 2011
[9] Mathisen, “Security Challenges and Solutions in Cloud Computing” 5th IEEE International
Conference on Digital Ecosystems and Technologies (IEEE DEST2011) , Daejeon, Korea, 31 May -3
June 2011
[10]R. La‘Quata Sumter, ―Cloud Computing: Security Risk Classificationǁ, ACMSE 2010, Oxford, USA
[11]Meiko Jensen ,Jorg Sehwenk et al., “On Technical Security,Issues icloud Computing ”IEEE
International conference on cloud Computing, 2009.
[12]M.Jensen ,N.Gruschka et al., “The impact of flooding Attacks on network based
services”Proceedings of the IEEE International conference on Availiabilty,Reliability and Security
(ARES) 2008.
[13]Armbrust ,M. ,Fox, A., Griffth, R., et al “Above the clouds: A Berkeley View of Cloud Computing” ,
UCB/EECS-2009-28,EECS Department University of California Berkeley, 2009
http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.pdf
[14]Wayne A. Jansen, ―Cloud Hooks: Security and Privacy Issues in Cloud Computingǁ, 44th Hawaii
International Conference on System Sciesnces 2011.
[15]Rituik Dubey et al., “Addressing Security issues in Cloud
Computing”http://www.contrib.andrew.cmu.edu/~rdubey/index_files/cloud%20com puting.pdf
[16]M. Okuhara et al., “Security Architecture for Cloud Computing”,
www.fujitsu.com/downloads/MAG/vol46-4/paper09.pdf
[17] “A Security Analysis of Cloud Computing” http://cloudcomputing.sys- con.com/node/1203943
[18] “Cloud Security Questions? Here are some
answers”http://cloudcomputing.syscon.com/node/1330353
[19]Cloud Computing and Security –A Natural Match, Trusted Computing Group(TCG)
http://www.trustedcomputinggroup.org
[20] “Controlling Data in the Cloud:Outsourcing Computation without outsourcing Control
http://www.parc.com/content/attachments/ControllingDataInTheCloud- CCSW-09.pdf
[21] “Amazon Web services: Overview of Security processes “ September 2008 http://aws.amazon.com
[22]T. Schreiber, “Session Riding a Widespread Vulnerability in Today'sWeb Applications” [Online],
Available: http://www.securenet.de/papers/Session_Riding.pdf, white paper, 2004. [Accessed: 20-Jul-
2011].
[23]J., Grimes, P., Jaeger, J., Lin, “Weathering the Storm: The Policy Implications of Cloud Computing”
[Online], Availablehttp://ischools.org/images/iConferences/CloudAbstract13109F INAL.pdf , [Accessed:
19-Jul-2011].
[24]B. Grobauer, T. Walloschek, and E. Stocker, “Understanding Cloud Computing Vulnerabilities,”
Security & Privacy, IEEE, vol. 9, no. 2, pp.50-57, 2011.
[25]A., Greenberg, “Why Cloud Computing Needs More Chaos”
[Online],Available:http://www.forbes.com/2009/07/30/cloud-computing- security-technology-
cionetwork-cloud-computing.html, 2009, [Accessed: 20-Jul-2011].
[26]Top 7 threats to cloud computing. HELP NET SECURITY.
http://www.netsecurity.org/secworld.php?id=8943
[27]Rion Dutta, ”Planning for Single SignOn”, White Paper, MIEL e- Security Pvt
[28]M. Armbrust, et al., A view of cloud computing. Commun. ACM. vol. 53 (2010), pp. 50-58
[29]Miranda Mowbray and Siani Pearson, A client-based privacy manager for cloud computing. In Proc.
Fourth International Conference on Communication System Software and Middleware (ComsWare),
Dublin, Ireland, 16-19 June 2009.
AUTHORS
Kashif Munir receives his BSc degree in Mathematics and Physics from Islamia
University Bahawalpur in 1999. He received his MSc degree in Information
Technology from University Sains Malaysia in 2001. He also obtained another MS
degree in Software Engineering from University of Malaya, Mala ysia in 2005. His
research area was in the field secure network for mobile devices, Cloud and pervasive
computing.
Mr. Kashif was the lecturer at Stamford College, Malaysia. Currently, he is Lecturer in the Computer
Science & Engineering Unit at Hafr Al-Batin Community CollegeKFUPM, Saudi Arabia. He is doing his
PhD at Malaysian University of Science and Technology, Malaysia.
Prof. Dr. Sellappan Palaniappan is currently the Acting Provost and the Dean of
Scho ol of Science and Engineering at Malaysia University of Science and Technology
(MUST). Prior to joining MUST, he was an Associate Professor at the Faculty of
Computer Science and Information Technology, University of Malaya. He holds a PhD
in Interdisciplinary Information Science from the University of Pittsburgh and a Master
in Computer Science from the University of London.
Dr. Sellappan is a recipient of several Government research grants and has published numerous journals,
conference papers and IT books. He has served as an IT Consultant for several local and international
agencies such as the Asian Development Bank, the United Nations Development Programme, the World
Bank and the Government of Malaysia. He has conducted workshops for companies. He is also an
external examiner/assessor for several public and private universities. He was a member of IEEE (USA),
Chartered Engineering Council (UK) and British Computer Society (UK), and is currently a member of
the Malaysian National Computer Confederation (MNCC).
AN APPROACH FOR BREAST CANCER DIAGNOSIS CLASSIFICATION USING
NEURAL NETWORK
Htet Thazin Tike Thein1
and Khin Mo Mo Tun2
1
Ph.D Student, University of Computer Studies, Yangon, Myanmar
2
Department of Computational Mathematics, University of Computer Studies, Yangon,
Myanmar
ABSTRACT
Artificial neural network has been widely used in various fields as an intelligent tool in recent
years, such as artificial intelligence, pattern recognition, medical diagnosis, machine learning and
so on. The classification of breast cancer is a medical application that poses a great challenge for
researchers and scientists. Recently, the neural network has become a popular tool in the
classification of cancer datasets. Classification is one of the most active research and application
areas of neural networks. Major disadvantages of artificial neural network (ANN) classifier are
due to its sluggish convergence and always being trapped at the local minima. To overcome this
problem, differential evolution algorithm (DE) has been used to determine optimal value or near
optimal value for ANN parameters. DE has been applied successfully to improve ANN learning
from previous studies. However, there are still some issues on DE approach such as longer
training time and lower classification accuracy. To overcome these problems, island based model
has been proposed in this system. The aim of our study is to propose an approach for breast
cancer distinguishing between different classes of breast cancer. This approach is based on the
Wisconsin Diagnostic and Prognostic Breast Cancer and the classification of different types of
breast cancer datasets. The proposed system implements the island-based training method to be
better accuracy and less training time by using and analysing between two different migration
topologies.
KEYWORDS
Neural Network, Differential Evolution, Island Model, Classification, Breast Cancer Diagnosis
For More Details : http://airccse.org/journal/acij/papers/6115acij01.pdf
Volume Link : http://airccse.org/journal/acij/vol6.html
REFERENCES
[1] Arun George Eapen, master thesis, Application of Data Mining in Medical Applications, Waterloo,
Ontario, Canada, 2004.
[2] Choi J.P., Han T.H. and Park R.W., ―A Hybrid Bayesian Network Model for Predicting Breast
Cancer Prognosisǁ, J Korean Soc Med Inform, pp. 49-57, 2009.
[3] Hassanien Ella Aboul and Ali H.M. Jafar, ―Rough set approach for generation of classification rules
of Breast Cancer data,ǁ Journal Informatica, vol. 15, pp. 23–38, 2004.
[4] Jamarani S. M. h., Behnam H. and Rezairad G. A., ―Multiwavelet Based Neural Network for Breast
Cancer Diagnosisǁ, GVIP 05 Conference, pp. 19-21, 2005.
[5] A. Cichocki and R. Unbehauen, ‗‘ Neural Networks for optimization and signal processing,‘‘ J.
Wiley, Sons Ltd. And B.G. Teubner, Stuttgart, 1993.
[6] Abdelaal Ahmed, Mohamed Medhat and Farouq Wael Muhamed, ―Using data mining for assessing
diagnosis of breast cnacer,ǁ in Proc. International multiconference on computer science and information
Technology, pp. 11 -17, 2010.
[7] Bellaachia Abdelghani and Erhan Guven, "Predicting Breast Cancer Survivability using Data Mining
Techniques," Ninth Workshop on Mining Scientific and Engineering Datasets in conjunction with the
Sixth SIAM International Conference on Data Mining,ǁ 2006.
[8] Burke H. B. Et al, ―Artificial Neural Networks Improve the Accuracy of Cancer Survival Predictionǁ,
Cancer, vol.79, pp.857-862, 1997
[9] R. Storn and K. Price, ―Differential evolution—A simple and efficient heuristic for global
optimization over continuous spaces,ǁ J. Glob. Optim., vol. 11, no. 4, pp. 341–359, Dec. 1997.
[10] K. V. Price, R. M. Storn, and J. A. Lampinen, Differential Evolution—A Practical Approach to
Global Optimization. Berlin, Germany: SpringerVerlag, 2005.
[11] Z. Skolicki and K. De Jong. The influence of migration sizes and intervals on island models. In
GECCO‘05: Proceedings of the 2005 conference on Genetic and evolutionary computation, pages 1295-
1302, New York, NY, USA, ACM, 2005.
[12] Breast Cancer Wisconsin Data [online]. Available: http://archive.ics.uci.edu/ml/machine-
learningdatabases/breast-cancer-wisconsin/breast-cancer-wisconsin.data.
[13] Dr. K. U. Rani, ―Parallel Approach for Diagnosis of Breast Cancer using Neural Network
Techniqueǁ Int. J. of Computer. Application, vol. 10, no. 3, pp. 0975 – 8887, Nov. 2010.
[14] Abdul Sttar Ismail Wdaa ― Differential evolution for neural networks learning enhancement ǁ J. of
university of anbar for pure science: Vol.5: No.2: 2011.
[15] Jun Zhang MS, Haobo Ma Md MS, ―An Implementation of Guildford Cytological Grading System
to diagnose Breast Cancer Using Naïve Bayesian Classifierǁ, MEDINFO, M.Fieschi et al. (Eds),
Amsterdam: IOS Press, 2004.
[16] Kamruzzaman S.M. and Monirul Islam Md, ―Extraction of Symbolic Rules from Artificial Neural
Networksǁ Proceedings of world Academy of science, Engineering and Technology, vol. 10, ISSN 1307-
6884, Dec. 2005.
[17] Punitha A., Sumathi C.P. and Santhanam T., ―A Combination of Genetic Algorithm and ART
Neural Network for Breast Cancer Diagnosisǁ Asian Journal of Information Technology 6 (1):112-117,
2007, Medwell Journals, 2007.
[18] Rudy Setiono and Huan Liu, ―Neural-Network Feature Selectorǁ IEEE Transactions On Neural
Networks, vol. 8, No. 3, pg 664-662, May 1997.
[19] Wlodzislaw Duch and Rafal Adamczak and Krzysztof Grabczewski, ―A New methodology of
Extraction, Optimization and Application of Crisp and Fuzzy Logic Rulesǁ IEEE Transactions On Neural
Networks, vol. 12, No. 2, pp. 227-306, March 2001.
[20] Anupam Shukla, Ritu Tiwari and Prabhdeep Kaur, ―Knowledge Based Approach for Diagnosis of
Breast Cancerǁ IEEE International Advance Computing Conference, Patiala, India, pp. 6-12, March 2009.
[21] Esugasini S, Mohd Yusoff Mashor, Nor Ashidi Mat Isa and Nor Hayati Othman, Performance
omparison for MLP Networks Using Various Back Propagation Algorithms for Breast Cancer Diagnosis,
Knowledge-Based Intelligent Information and Engineering Systems, Lecture Notes in Computer Science,
3682, pp. 123-130, 2005.
[22] Paulin F. and Santhakumaran A., ―Extracting Rules from Feed Forward Neural Networks for
Diagnosing Breast Cancerǁ CiiT International Journal of Artificial Intelligent Systems and Machine
Learning, vol. 1, No. 4, pp. 143-146, July 2009.
[23] D. Karaboga and S. Okdem, ―A simple and global optimization algorithm for engineering
problems: Differential evolution algorithm,ǁ Turkish J. Elect. Eng. Comput. Sci., vol. 12, no. 1, pp. 53–
60, 2004.
EFFECTIVE WAYS CLOUD COMPUTING CAN CONTRIBUTE TO EDUCATION
SUCCESS
BV Pranay kumar1
, Sumitha kommareddy2
and N.Uma Rani3
1,2
Department of information technology, CJITS, Jangaon, Warangal
3
Department of computer science and engineering, CJITS, Jangaon, Warangal
ABSTRACT
Cloud computing and education sounds ambiguous on the face of it. Naturally, it’s because, very
few individuals, publishers and users alike come from the education sector. In most cases, cloud
computing is only associated with businesses and how they can leverage their efficiencies. Just
to introduce how the cloud deserves a place in our current education institution, it’s important to
reiterate the education philosophy. Its essence is knowledge. It’s this knowledge which brings
advancement, achievement and success. However, there are several things which make these
parameters unattainable. In blunt language, this is failure. Small classrooms, lack or resources,
short-handed staff, lack of adequate teachers…the list is endless. One way or the other, cloud
computing can be utilized to improve education standards and activities. The end result will be to
curb the above problems and instead, boost performance.
KEYWORDS
Cloud Computing, Web service, Virtualization, Grid Computing, Virtual Computing Lab,
Higher education institutions, Remote areas.
For more Details: http://airccse.org/journal/acij/papers/4413acij02.pdf
Volume Link: http://airccse.org/journal/acij/vol4.html
REFERENCES
[1] C. Justin, B. Ivan, K. Arvind and A. Tom, Seattle: A Platform for Educational Cloud Computing,
SIGCSE09, March 37, 2009, Chattanooga,Tennessee, USA, 2009.
[2] P. Shanthi Bala, INTENSIFICATION OF EDUCATIONAL CLOUD COMPUTING AND CRISIS
OF DATA SECURITY IN PUBLIC CLOUDS, (IJCSE) International Journal on Computer Science and
Engineering Vol.02, No. 03, 2010, 741-745. 2007.
[3] M. Armbrust, et al, Above the clouds: A Berkeley view of Cloud Computing, UC Berkeley
EECS,2009.
[4] S. Al Noor, G. Mustafa, S. Chowdhury, Z. Hossain, and F. Jaigirdar, A Proposed Architecture of
Cloud Computing for Education System in Bangladesh and the Impact on Current Education System,
(IJCSNS) International Journal of Computer Science and Network Security, VOL.10 No.10. 2010.
[5] M. Luis, R. Luis, C. Juan and L. Maik, A Break in the Clouds: Towards a Cloud Definition, ACM
SIGCOMM Computer Communication Review, Volume 39, Number 1. 2005.
[6] Cloud Computing Articles. Cloud Computing Education,
http://www.code2cloud.com/cloudcomputing-education/
[7] Cloud Computing Articles, SaaS+PaaS+IaaS. Free Cloud Apps for Educational Institutes: Schools,
Colleges, Universities, http://www.technopulse. com/2010/08/free-cloud-apps-educationalinstitutes.html/
[8] IBM Academic Initiative. Cloud computing: Delivering Internetbased information and technology
services in real time, https://www.ibm.com/developerworks/university/cloud/
[9] IBM Sales and Distribution - Solution Brief for Education. IBM Cloud Academy Education for a
smarter planet, ftp://dispsd-40-www3.boulder.ibm.com/
[10] R. CJB and N. Evans. A PROPOSAL FOR THE ADOPTION AND USE OF CLOUD
COMPUTING IN SECONDARY EDUCATION IN SOUTH AFRICA, 11th DIS Annual Conference
2010, 2nd 3rd September,Richardsbay, University of Zululand, South Africa, 2010.
[11] THE ABC’S OF ENGINEERING EDUCATION: ABET, BLOOM’S TAXONOMY,
COOPERATIVE LEARNING, AND SO ON
[12] K. Youry and V. Volodymyr. Cloud Computing Infrastructure Prototype for University Education
and Research, WCCCE ’10, May 78, 2010, Kelowna, Canad, 2010.
[13] M. Grimes, T. Jaeger and J. Lin. Weathering the Storm: The Policy Implications of Cloud
Computing, iConference, 2009.
[14] Microsoft Education Cloud Computing. The most comprehensive solutions for the cloud. On earth,
http://www.microsoft.com/en-us/cloud/
[15] Microsoft in Education — IT solutions. Microsoft Live@edu,
http://www.microsoft.com/education/en-us/solutions/Pages/liveedu.aspx/
[16] R. Elumalai and V. Ramachandran. A Cloud Model for Educational e-Content Sharing, European
Journal of Scientific Research, ISSN 1450-216X Vol.59 No.2, pp.200-207. 2011.
[17] N. Sultan. Cloud computing for education: A new dawn?, International Journal of Information
Management, 109116, 30 2010.
[18] M. Victoria, and D. Brbara. Cloud computing for education: A new dawn?, A design of a
postgraduate course on Google Apps based on an Institutional Personal Learning Environment (iPLE).
[19] Amazon Web Services. Overview of Amazon Web Services,
http:==media:amazonwebservices:com=AWSOverview:pdf=
[20] X. Dong and L. Hui. Reviewing some Cloud Computing Platforms, ISBN 978-952-5726-09-1,
Proceedings of the Second International Symposium on Networking and Network Security (ISNNS 10),
Jinggangshan, P. R., pp. 161-164, China. 2010.
[21] An Amazon Web Services Case Study. Migrating Applications to the Cloud,
http://www.cloudcomputingcourse.com/
[22] Amazon Web Services. AWS in Education, http://aws.amazon.com/education/
[23] MC Graw Hill. Cloud Computing Basics, Chapter 1.
[24] IBM. New IBM Cloud Services to Address Education Challenges,
http://www03.ibm.com/press/us/en/pressrelease/34642.wss/
[25] IBM Global Technology Services, Getting cloud computing right,
http://www05.ibm.com/de/cloud/pdf/Gettingcloudcomputingright.pdf/
[26] IBM Sales and Distribution, Education, Solution Brief. IBM Virtual Computing Lab Solutions for
Cloud, Solution Brief.
[27] salesforce foundation. salesforce for Higher Education,
http://www.salesforcefoundation.org/product/
[28] HP CLOUDSYSTEM. A single platform for private, public, and hybrid clouds. Simply the most
complete cloud system for enterprises and service providers, Hewlett-Packard Development Company.
2011.
[29] Amanda & Zmanda. Amanda and Zmanda Applications, http://www.zmanda.com/
[30] Zmanda Cloud Backup. Zmanda Cloud Backup for Windows,
http://www.zmanda.com/cloudbackup.html/
[31] Cloud Computing. Risk of Cloud Computing in Universities, http :
==www:istf:jucc:edu:hk=newsletter=IT03=IT 3CloudComputing:pdf=[32] Microsoft, Education all in.
Cloud Computing from Microsoft - Empowering Education through Choice,
https://partner.microsoft.com/NZ/40142863/
[33] P. Thomas. Cloud Computing: A potential paradigm for practicing the scholarship of teaching and
learning, Centre for Academic Development, University of Botswana.
[34] Microsoft, Cloud Computing Web Site. Cloud Computing in Education,
http://www.edutechhosting.co.uk/
[35] A Microsoft U.S. Education white paper. Cloud computing in education Savings, flexibility, and
choice for IT, http://www.microsoft.com/educloud/
[36] V. Toby, V. Anthony and E. Robert. Cloud Computing, A Practical Approach, ISBN-13: 978-0-07-
162694-1, 353 Pages. 2009.
[37] R. Herrick. Google This! Using Google Apps for Collaboration and Productivity, SIGUCCS09,
October 1114, 2009, St. Louis, Missouri, USA. 2009.
[38] GOOGLE APPS EDUCATION EDITION. Google Apps Education Edition: communication,
collaboration, and security in the cloud, http://www.google.com/a/edu/
[39] A. Vouk. Cloud Computing Issues, Research and Implementations, Journal of Computing and
Information Technology - CIT 16, 2008, 4, 235246, doi:10.2498/cit.1001391. 2008.
[40] Amazon Web Services (AWS) Web Site. What is AWS - A comprehensive cloud computing
platform, http://aws.amazon.com/what-is-aws/
[41] Amazon Web Services, Case Study. Application Hosting,
http://aws.amazon.com/solutions/casestudies/
[42] Amazon Web Services (AWS), EC2 Web Site. Amazon Elastic Compute Cloud (Amazon EC2),
http://aws.amazon.com/ec2/
[43] AWS Case Study: Educations.com, Web Site. AWS Case Study: Educations. com,
http://aws.amazon.com/solutions/case-studies/educationscom/
[44] D. Jiabin. Virtualization, Application Streaming and Private Cloud Computing in a Training
Laboratory, JOURNAL OF SOFTWARE, VOL. 5, NO. 11,doi:10.4304/jsw.5.11.1306-1313. 2010.
[45] N. Sclater. CLOUD COMPUTING IN EDUCATION: POLICY BRIEF, UNESCO Institute for
Information Technologies in Education. 2010.
[46] Cloud-onomics in education, IBM Cloud Academy, Web Site. Cloud 9: Future Compatible
Computing in Education, http://www.ibm.com/ibm/files/T641866T23726I58/EBE03001USEN.PDF/
[47] Silanis e-SignLive Services. Software-as-a-Service (SaaS) e-Signature Service,
http://www.eignlive.com/services.html/
[48] Salesforce.com foundation, Higher Education Solution. Taking higher education to a higher level,
http://www.salesforcefoundation.org/products/discounts/higher-ed/
[49] Salesforce:com foundation, Higher Education. The Real Time Cloud for Higher Education,
http://www.salesforcefoundation.org/
[50] Cloud Computing Applications Web Site. Cloud Computing Applications and Services in Education,
http://www.shaswatpatel.com/
[51] Microsoft News Center. Windows Azure and the Azure Services Platform: Making Microsofts
Software-plus-Services Vision a Reality,
http://www.microsoft.com/presspass/features/2008/oct08/10-27pdcfeature1.mspx/
[52] Computing Edge. Analyzing the Differences between Cloud Computingand Virtualization,
http://computinged.com/insights/
[53] VCL Web Site. VCL Conceptual Overview Diagram, https://cwiki.apache.org/VCL/
[54] Understanding Cloud Computing in Education - Web Site. VCL Conceptual Overview Diagram,
http://kasunpanorama.blogspot.com/2010/07/understanding-cloudcomputing- feel-easy.html/
[55] T. Harris. Cloud Computing Services - A comparison, http://www.thbs.com/
[56] IBM Cloud Academy. Education for a Smarter Planet:Cloud Computing in Education,
http://www.cetpa-k12.org/
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
M. Mary Shanthi Rani1
, K.Rosemary Euphrasia2
1
Dept. of Comp. Sci. and Applications, Gandhigram Rural Institute, Deemed University
Gandhigram, TamilNadu. India.
2
Department of computer Sci., Fatima College, Madurai, TamilNadu. India.
ABSTRACT
The art of information hiding has become an important issue in the recent years as security of
information has become a big concern in this internet era. Cryptography and Steganography play
major role for secured data transfer. Steganography stands for concealed writing; it hides the
message inside a cover medium. Cryptography conceals the content of a message by encryption.
QR (Quick Response) Codes are 2-dimensional bar codes that encode text strings. They are able
to encode information in both vertical and horizontal direction, thus able to encode more
information. In this paper a novel approach is proposed for secret communication by combining
the concepts of Steganography and QR codes. The suggested method includes two phases: (i)
Encrypting the message by a QR code encoder and thus creating a QR code (ii) Hiding the QR
code inside a colour image. This hiding process embeds the quantised QR code so that it will not
make any visible distortion in the cover image and it introduces very minimum Bit Error Rate
(BER). Experimental result shows that the proposed method has high imperceptibility, integrity
and security.
KEYWORDS
Steganography, QR code, BER
For More Details : https://aircconline.com/acij/V7N2/7216acij01.pdf
Volume Link : http://airccse.org/journal/acij/vol7.html
REFERENCES
[1] Ioannis Kapsalis., 2013. “Security of QR Codes“, Master thesis submitted in June 2013, Norwegian
University of Science and Technology
[2] Kinjal H. Pandyaand Hiren J. Galiyawala, 2014.” A Survey on QR Codes: in context of Research and
Application”, International Journal of Emerging Technology and Advanced Engineering, Vol. 4 Issue
3.,pp. 258-262Ioannis Kapsalis., 2013. “Security of QR Codes“, Master thesis submitted in June 2013,
Norwegian University of Science and Technology
[3] QRStuff. QR Code Error Correction, 2011. QRStuff blog:http://www.qrstuff.Com
/blog/2011/12/14/QR-code-error-correction.
[4] Law, C. & So, S., 2010. “QR codes in education. Journal of Educational Technology Development
and Exchange”, Vol. 3 Issue 1, pp. 85-100
[5] Shruti Ahuja, 2014. ” QR Codes and Security Concerns”, International Journal of International
Journal of Computer Science and Information Technologies, Vol. 5 Issue 3 pp. 3878-3879
[6] Akshara Gaikwad et al, 2015. “Information Hiding using Image Embedding in QRCodes for Colour
Images: A Review”, International Journal of Computer Science and Information Technologies, Vol. 6
Issue 1,pp. 278-283
[7] Dipika Sonawane et al., 2014. “QR based Advanced authentication for all hardware platforms
“International Journal of Scientific and Research Publications, Vol. 4(1) pp.1-4
[8] www. The-qrcode-generator.com
[9] ZXing, “Decoder Online,” 2011, http://zxing.org/w/decode.jspx
[10] M. Mary Shanthi Rani and K.Rosemary Euphrasia, 2015. “Dynamic Hiding of Message in RGB
Domain based on Random Channel Indicator”, International Journal of Applied Engineering
Research, Vol.10 No.76., pp. 478-483
AUTHORS
Dr.M. Mary Shanthi Rani, a NET qualified Assistant Professor in the Department of
Computer Science and Applications, Gandhigram Rural Institute (Deemed
University), Gandhigram has twelve years of teaching and eight years of research
experience as well. She has nearly twenty publications in International Journals and
Conferences. Her research areas of interest are Image Compression, Information
Security, Ontology, Biometrics and Computational Biology. She has authored a book
titled “Novel Image Compression Methods Based on Vector Quantization” and is
one of the editors of Conference Proceedings “Recent Advances in Computer Science and Applications”.
S he has served in various academic committees in designing the curriculum for B.Sc. and M.C.A courses
as well. She has also served as reviewer of Peer-reviewed International Journals and Conferences and is a
Life member of Indian Society for Technical Education. She has the credit of being the Associate Project
Director of UGC Indo-US 21st Knowledge Initiative Project.
Ms. K.Rosemary Euphrasia Associate Professor in Computer Science, Fatima
College, Madurai. She received B.Sc., and M.Sc., degrees in Physics and M.Phil.
degree in Computer scien ce. She has 20 years of teaching experience in computer
science. She is now studying towards her Ph.D. degree in Computer science at
Gandhigram Rural Institute – Deemed University, Gandhigram, Tamilnadu, India.
Her area of research is information security through video steganography.
IMPROVING PRIVACY AND SECURITY IN MULTITENANT CLOUD ERP SYSTEMS
Djamal Ziani and Ruba Al-Muwayshir
Department of Information Systems, King Saud University, Riyadh, Saudi Arabia
ABSTRACT
This paper discusses cloud ERP security challenges and their existing solutions. Initially, a set of
definitions associated with ERP systems, cloud computing, and multi-tenancy, along with their
respective challenges and issues regarding security and privacy, are provided. Next, a set of
security challenges is listed, discussed, and mapped to the existing solutions to solve these
problems. This thesis aims to build an effective approach to the cloud ERP security management
model in terms of data storage, data virtualization, data isolation, and access security in cloud
ERP. The following proposed techniques are used to improve the security for multi-tenant SaaS:
database virtualization, implementation of data encryption and search functionality on databases
and developed systems, distribution of data between tenant and ERP providers, secure
application deployment in multi-tenant environments, implementation of the authentication and
developed systems together as a two-factor authentication, and improved user access control for
multi-tenant ERP clouds.
KEYWORDS
ERP, ERP system, ERP problems, ERP security challenges, ERP security solutions, ERP and
cloud computing
For More Details : http://aircconline.com/acij/V8N5/8517acij01.pdf
Volume Link : http://airccse.org/journal/acij/vol8.html
REFERENCES
[1] M.A. Vouk, (2008) “Cloud computing–issues, research and implementations”, CIT. Journal of
Computing and Information Technology, Vol. 16, No. 4, pp235-246.
[2] A. Patel & M. Kumar, (2013) “A Proposed Model for Data Security of Cloud Storage Using Trusted
Platform Module”, International Journal of Advanced Research in Computer Science and Software
Engineering, Vol. 3, No. 4.
[3] D.P.D.S. Abburu, (2012). “An Approach for Data Storage Security in Cloud Computing”, IJCSI
International Journal of Computer Science Issues, Vol. 9, No. 2.
[4] M. Almorsy, J. Grundy, & A.S. Ibrahim, (2012, June) “Tossma: A tenant-oriented saas security
management architecture”, In Cloud computing (cloud), 2012 IEEE 5th international conference on (pp.
981-988). IEEE.
[5] S. Subashini & V. Kavitha, (2010), “A Survey on Security Issues in Service Delivery Models of
Cloud Computing”, Journal of Network and Computer Applications, Vol. 34, No.1, pp1 -11.
[6] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R. Katz, Konwinski, A., ... & M. Zaharia, (2010) “A
view of cloud computing”, Communications of the ACM, 53(4), 50-58.
[7] A. Azeez, S. Perera, D. Gamage, R. Linton, P. Siriwardana, D. Leelaratne, ... & P. Fremantle, (2010,
July), “Multi-tenant SOA middleware for cloud computing”, In Cloud computing (cloud), 2010 ieee 3rd
international conference on (pp. 458-465). IEEE.
[8] D. Banks, J. Erickson, & M. Rhodes, (2009), “Multi-tenancy in cloud-based collaboration services”,
Information Systems Journal. BCG (2012).
[9] M. Armbrust et al., (2009), “A view of cloud computing”, Communications of the ACM, 53(4), p.50.
Available at: http://inst.cs.berkeley.edu/~cs10/fa10/lec/20/2010-11-10-CS10-L20-AF-Cloud
Computing.pdf [Accessed July 30, 2012].
[10] S.L. Dinesh Kumar Saini, Yousif,, J.H. Sandhya, & V. Khandage, (2011), “Cloud Computing and
Enterprise Resource Planning Systems”, Proceedings of the World Congress on Engineering, Vol. 4.
[11] D. Harnik, B. Pinkas, A. Shulman-Peleg, (2010), “Side channels in Cloud services: deduplication in
Cloud Storage”, IEEE Security Privacy, Vol. 8, No. 6, pp40–47.
[12] E. Fathi Kiadehi, & S. Mohammadi, (2012), “Cloud ERP: Implementation of Enterprise Resource
Planning Using Cloud Computing Technology”, Journal of Basic and Applied Scientific Research, Vol. 6.
[13] U. Somani, K. Lakhani, M. Mundra, (2010), “Implementing digital signature with RSA encryption
algorithm to enhance the data Security of Cloud in Cloud Computing”, In: 1st International conference on
parallel distributed and grid Computing (PDGC), IEEE Computer Society Washington, DC, USA,
pp211–216.
[14] G. F Fathima Haseen Raihana & J. A. Jamal Mohamed College, (2012), “CLOUD ERP– A
SOLUTION MODEL”, IRACST - International Journal of Computer Science and Information
Technology & Security (IJCSITS), ISSN, Vol. 2, No. 4, pp4.
[15] S. Xiao & W. Gong, (2010), “Mobility Can help: protect user identity with dynamic credential”, In:
Eleventh International conference on Mobile data Management (MDM), IEEE Computer Society,
Washington, DC, USA, pp378–380.
[16] R. Mietzner, T. Unger, R. Titze, & F. Leymann, (2009), “Combining Different Multi-Tenancy
Patterns in Service Oriented Applications,” presented at the IEEE Enterprise Distributed Object
Conference, Auckland.
[17] E. Kimberling, (2011), “Is SaaS ERP right for your organization,” 360° ERP Blog.
[18] A. Lenart, (2011), “ERP in the Cloud–Benefits and Challenges”, In Research in systems analysis and
design: Models and methods, pp39-50, Springer Berlin Heidelberg.
[19] Md Asif Mushtaque, R. Sindhu, (2014), “A New Innovation On User’S Level Security For Storage
Data In Cloud Computing”, International Journal of Grid Distribution Computing 7.3, pp213-220.
[20] J. Müller, J. Krüger, S. Enderlein, M. Helmich, & A. Zeier, A, (2009), “Customizing enterprise
software as a service applications: Back-end extension in a multi-tenancy environment”, In Enterprise
Information Systems, pp66-77. Springer Berlin Heidelberg.
[21] S. Na, K. Kim, & E. Huh, (2013), “A Methodology for Evaluating Cloud Computing Security
Service-Level Agreements”, International Journal of Advancements in Computing Technology (IJACT),
Vol. 5, No. 13.
[22] R. Muhleman, P. Kim, V. J. Homan, & J. Breese-Vitelli, (2012), “Cloud Computing: Should I Stay
or Should I Cloud?”, presented at the Conference on Information Systems Applied Research, New
Orleans Louisiana, USA.
[23] M. Okuhara, T. Shiozaki, & T. Suzuki, (2010), “Security architecture for cloud computing”, Fujitsu
Sci. Tech. J, Vol. 46, No. 4, pp397-402.
[24] Z. Pervez, S. Lee, & Y.K. Lee, (2010, February), “Multi-tenant, secure, load disseminated SaaS
architecture”, In Advanced Communication Technology (ICACT), 2010 The 12th International
Conference on (Vol. 1, pp214-219). IEEE.
[25] P.S. Petra Schubert, & A.F. Femi Adisa, (2011), “Cloud Computing for Standard ERP Systems:
Reference Framework and Research Agenda”, Arbeitsberichte aus dem Fachbereich Informatik, Vol. 4,
No. 27, pp29.
[26] L. Qian, Z. Luo, Y. Du, & L. Guo, L, (2009), “Cloud computing: An overview”, In Cloud
Computing, pp626-631. Springer Berlin Heidelberg.
[27] G. Reddy & N. Subashini, (2014), “Secure Storage Services and Erasure Code Implementation in
Cloud Servers”, International Journal of Engineering Research & Technology (IJERT), Vol. 3, No. 1,
pp1810-1814.
[28] P. Hofmann, (2010), “Cloud Computing: The Limits of Public Clouds for Business Applications”,
IEEE Internet Computing, Vol.. 14, No. 6, pp90–93.
[29] A. Satapathy, & J. Badajena, (2013), “A Secure Model and Algorithms for Cloud Computing based
on Multicloud Service Providers”, International Journal Computational Intelligence and Informatics, Vol.
3, No. 1.
[30] B. McCrea, “Putting the spotlight on ERP,” Logistics Management, pp32 – 35, Jun-2011.
[31] Y. Xu, N. Rahmati, & V. Lee, (2008, June), “A review of literature on Enterprise Resource Planning
systems”, In Service Systems and Service Management, 2008 International Conference on (pp1-6). IEEE.
[32] S. Salleh, S. Maliza, T. Yen, & C. Chan, (2012), “Cloud Enterprise Systems: A Review of Literature
and its Adoption”, presented at the PACIS 2012 Proceedings, Hochiminh City, 2012.
[33] J. Esteves, & J. Pastor, (2001), “ENTERPRISE RESOURCE PLANNING SYSTEMS RESEARCH:
AN ANNOTATED BIBLIOGRAPHY”, Communications of AIS, Vol. 7, No. 8.
[34] N. Sahin, (2013), “Cloud ERP Security: Guidelines for Evaluation”, Department of Computer and
Systems Sciences.
[35] J. Umble, R. Ronald, M. Haft, & U. Michael, (2003), “Enterprise resource planning: Implementation
procedures and critical success factors”, European Journal of Operational Research, Vol. 146, pp241–257.
[36] X. Xun, (2012), “From cloud computing to cloud manufacturing”, Robotics and Computer-
Integrated Manufacturing Vol. 28, pp75–86. New Zealand.
[37] S. Walraven, E. Truyen, W. Joosen, F. Kon, & A. Kermarrec, (2011), “A Middleware Layer for
Flexible and Cost-Efficient Multi-tenant Applications”, IFIP International Federation for Information
Processing, pp370–389.
[38] W. Voorsluys, J. Broberg, & R. Buyya, (2011), “Introduction to cloud computing”, Cloud
computing: Principles and paradigms, 2-44.
[39] L. Bangfan, Z. Huihui, & W. Meng, (2014), “How to Design the Cloud Computing Used in
Egovernment’s Information Security?”, Applied Mechanics and Materials, Vol. 536-537, pp616-619.
[40] A. Bezemer & C. P., Zaidman. (2010), “Multi-tenant SaaS applications: maintenance dream or
nightmare?”, in In Proceedings of the Joint ERCIM Workshop on Software Evolution (EVOL) and
International Workshop on Principles of Software Evolution (IWPSE), pp88–92.
[41] M. Kapuruge, A. Colman, J. Han, A. Bouguettaya, M. Hauswirth, & L. Liu, L, (2011), “Achieving
Multi-tenanted Business Processes in SaaS Applications”, Springer-Verlag Berlin Heidelberg. pp143–
157.
[42] E. Shehab, M. Sharp, L. Supramaniam, & T Spedding, (2004), “Enterprise resource planning An
integrative review”, Business Process Management Journal, Vol. 10 No. 4.
[43] J. Ju, Y. Wang, J. Fu, J. Wu, & Z. Lin, (2010), “Research on Key Technology in SaaS”, in 2010
International Conference on Intelligent Computing and Cognitive Informatics, pp. 384–387.
[44] H. Wang & Z. Zheng, (2010), “Software architecture driven configurability of multi-tenant SaaS
application”, in Web Information Systems and Mining (WISM), 2010, pp418–424.
[45] D. Johnson, (2010), “Multi-tenant versus Single-tenant ERP – a comparison,” [Online]. Available:
http://erpcloudnews.com/2010/06/multi-tenant-versus-single-tenant-erp-a-comparison/. [Accessed: 28-
Aug-2013].
[46] D. Banks, J. Erickson, & M. Rhodes, (2009), “Multi-tenancy in Cloud-based Collaboration
Services”, Hewlett-Packard Development Company, L.P.
AUTHORS
Djamal Ziani has been an associate professor in the Computer Sciences and
Information Systems College at King Saud University since 2009. He is also a
researcher in ERP and a member of the data management group of CCIS, King Saud
University. He received a Master’s degree in Computer Sciences from the University
of Valenciennes, France in 1992, and Ph.D. in Computer Science from the University
of Paris, Dauphine, France in 1996. From 1998 to 2009, he was a consultant and
project manager in many companies in Canada, such as SAP, Bombardier
Aerospace, and Montreal Stock Exchange.
Ruba Almuwayshir is a teaching assistant at AlJouf University and a master’s student at King Saud
University.

More Related Content

PDF
Most viewed article for an year in academia - Advanced Computing: An Internat...
PDF
TOP 5 Most View Article in Computer Science & Information Technology Research
PDF
Top Download Article in Computer Science & Information Technology Research: O...
PDF
April 2021: Top 10 View Article in Computer Science & Information Technology
PDF
PDF
Information Security Management in University Campus Using Cognitive Security
PDF
New Research Articles 2021 June Issue International Journal of Computer Scien...
PDF
January 2021 - Top 10 Read Articles in Network Security & Its Applications
Most viewed article for an year in academia - Advanced Computing: An Internat...
TOP 5 Most View Article in Computer Science & Information Technology Research
Top Download Article in Computer Science & Information Technology Research: O...
April 2021: Top 10 View Article in Computer Science & Information Technology
Information Security Management in University Campus Using Cognitive Security
New Research Articles 2021 June Issue International Journal of Computer Scien...
January 2021 - Top 10 Read Articles in Network Security & Its Applications

What's hot (20)

PDF
March 2021: Top 10 Read Articles in Network Security and Its Applications
PDF
October 2020 - Top Read Articles in Network Security & Its Applications
PPTX
Various security issues and its solutions in the
PDF
Ms3422732277
PDF
07 20251 latest trends, challenges ed
PDF
Top 10 Read Article in Computer Science & Information Technology: September 2021
PDF
B018211016
DOCX
Trends in Information Management
PDF
Top Reading Papers : Web & Semantic Technology
DOCX
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
PDF
07 20252 cloud computing survey
PDF
F.Curriculum Vitae
PDF
Paper published
PDF
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
PDF
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
PDF
A systematic mapping study of security, trust and privacy in clouds
PPTX
Cloud computing final
DOCX
Cloudcomputingthesis
PDF
Common protocol to support disparate communication types within industrial Et...
PPTX
Securing Research Data: A Workshop on Emerging Practices in Computation and S...
March 2021: Top 10 Read Articles in Network Security and Its Applications
October 2020 - Top Read Articles in Network Security & Its Applications
Various security issues and its solutions in the
Ms3422732277
07 20251 latest trends, challenges ed
Top 10 Read Article in Computer Science & Information Technology: September 2021
B018211016
Trends in Information Management
Top Reading Papers : Web & Semantic Technology
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
07 20252 cloud computing survey
F.Curriculum Vitae
Paper published
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
A systematic mapping study of security, trust and privacy in clouds
Cloud computing final
Cloudcomputingthesis
Common protocol to support disparate communication types within industrial Et...
Securing Research Data: A Workshop on Emerging Practices in Computation and S...
Ad

Similar to June 2020: Top Read Articles in Advanced Computing (20)

PDF
Jan_2024_Top_read_articles_in_ACIJ.pdf
PDF
SECURE CLOUD ARCHITECTURE
PDF
Ad4502189193
PDF
Investigative analysis of security issues and challenges in cloud computing a...
PDF
Cloud computing and security issues in the
PDF
Reliable security in cloud computing environment 2-3-4-5-6
DOCX
CLOUD CPOMPUTING SECURITY
PDF
CLOUD COMPUTING AND SECURITY ISSUES IN THE CLOUD
PDF
A Survey of Cloud Computing Security Issues and Consequences
DOCX
Trends in the IT Profession Annotated BibliographyAdemola Adeleke.docx
PDF
It auditing to assure a secure cloud computing
PDF
Adoption Of Cloud Computing In Nepal
PDF
IRJET - Cloud Computing Over Traditional Computing
PDF
IRJET- A Survey on SaaS-Attacks and Digital Forensic
PDF
Eb31854857
PDF
A survey on secured data outsourcing in cloud computing
PDF
1376843836 94879193
PDF
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
PDF
1376843836 94879193
PDF
Taxonomy of cloud security
Jan_2024_Top_read_articles_in_ACIJ.pdf
SECURE CLOUD ARCHITECTURE
Ad4502189193
Investigative analysis of security issues and challenges in cloud computing a...
Cloud computing and security issues in the
Reliable security in cloud computing environment 2-3-4-5-6
CLOUD CPOMPUTING SECURITY
CLOUD COMPUTING AND SECURITY ISSUES IN THE CLOUD
A Survey of Cloud Computing Security Issues and Consequences
Trends in the IT Profession Annotated BibliographyAdemola Adeleke.docx
It auditing to assure a secure cloud computing
Adoption Of Cloud Computing In Nepal
IRJET - Cloud Computing Over Traditional Computing
IRJET- A Survey on SaaS-Attacks and Digital Forensic
Eb31854857
A survey on secured data outsourcing in cloud computing
1376843836 94879193
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
1376843836 94879193
Taxonomy of cloud security
Ad

More from acijjournal (20)

PDF
Integrating Fractal Dimension and Time Series Analysis for Optimized Hyperspe...
PDF
July 2025-Top 10 Read articles ACIJ Advanced Computing: An International Jour...
PDF
MODEL AND ALGORITHM FOR INCREASING THE EFFICIENCY OF REMOTE SERVICE SYSTEMS S...
PDF
15th International Conference on Computer Science, Engineering and Applicatio...
PDF
4th International Conference on Computer Science and Information Technology (...
PDF
APPLICATION AND ANALYSIS OF ENSEMBLE ALGORITHMS IN SOLVING REGRESSION PROBLEMS
PDF
4th International Conference on Computer Science and Information Technology (...
PDF
Application and Analysis of Ensemble Algorithms in Solving Regression Problems
PDF
17th International Conference on Networks & Communications (NeTCoM 2025)
PDF
METHODS AND ALGORITHMS FOR ASSESSING COMPUTER NETWORK PERFORMANCE
PDF
Advanced Computing: An International Journal (ACIJ)
PDF
6 th International Conference on Data Mining and Software Engineering (DMSE 2...
PDF
ARTICLE :OVERVIEW OF STRUCTURE FROM MOTION
PDF
14th International Conference on Advanced Information Technologies and Applic...
PDF
2nd International Conference on Information Technology Convergence Services &...
PDF
Advanced Computing: An International Journal ( ACIJ )
PDF
3rd International Conference on Computer Science, Engineering and Artificia...
PDF
6th International Conference on Big Data and Machine Learning (BDML 2025)
PDF
METHODS AND ALGORITHMS FOR ASSESSING COMPUTER NETWORK PERFORMANCE
PDF
4th International Conference on Computing and Information Technology Trends (...
Integrating Fractal Dimension and Time Series Analysis for Optimized Hyperspe...
July 2025-Top 10 Read articles ACIJ Advanced Computing: An International Jour...
MODEL AND ALGORITHM FOR INCREASING THE EFFICIENCY OF REMOTE SERVICE SYSTEMS S...
15th International Conference on Computer Science, Engineering and Applicatio...
4th International Conference on Computer Science and Information Technology (...
APPLICATION AND ANALYSIS OF ENSEMBLE ALGORITHMS IN SOLVING REGRESSION PROBLEMS
4th International Conference on Computer Science and Information Technology (...
Application and Analysis of Ensemble Algorithms in Solving Regression Problems
17th International Conference on Networks & Communications (NeTCoM 2025)
METHODS AND ALGORITHMS FOR ASSESSING COMPUTER NETWORK PERFORMANCE
Advanced Computing: An International Journal (ACIJ)
6 th International Conference on Data Mining and Software Engineering (DMSE 2...
ARTICLE :OVERVIEW OF STRUCTURE FROM MOTION
14th International Conference on Advanced Information Technologies and Applic...
2nd International Conference on Information Technology Convergence Services &...
Advanced Computing: An International Journal ( ACIJ )
3rd International Conference on Computer Science, Engineering and Artificia...
6th International Conference on Big Data and Machine Learning (BDML 2025)
METHODS AND ALGORITHMS FOR ASSESSING COMPUTER NETWORK PERFORMANCE
4th International Conference on Computing and Information Technology Trends (...

Recently uploaded (20)

PPTX
web development for engineering and engineering
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
additive manufacturing of ss316l using mig welding
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
Construction Project Organization Group 2.pptx
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
PPT on Performance Review to get promotions
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
Digital Logic Computer Design lecture notes
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
Geodesy 1.pptx...............................................
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
Welding lecture in detail for understanding
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPT
Mechanical Engineering MATERIALS Selection
web development for engineering and engineering
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
additive manufacturing of ss316l using mig welding
Lecture Notes Electrical Wiring System Components
Construction Project Organization Group 2.pptx
R24 SURVEYING LAB MANUAL for civil enggi
PPT on Performance Review to get promotions
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
OOP with Java - Java Introduction (Basics)
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Digital Logic Computer Design lecture notes
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Geodesy 1.pptx...............................................
Foundation to blockchain - A guide to Blockchain Tech
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Welding lecture in detail for understanding
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Mechanical Engineering MATERIALS Selection

June 2020: Top Read Articles in Advanced Computing

  • 1. June 2020: Top Read Articles in Advanced Computing Advanced Computing: An International Journal (ACIJ) ISSN: 2229 - 6727 [Online]; 2229 - 726X [Print] http://airccse.org/journal/acij/acij.html
  • 2. SECURE CLOUD ARCHITECTURE Kashif Munir1 and Prof Dr. Sellapan Palaniappan2 1 School of Science and Engineering, Malaysia University of Science and Technology, Selangor, Malaysia 2 School of Science and Engineering, Malaysia University of Science and Technology, Selangor, Malaysia ABSTRACT Cloud computing is set of resources and services offered through the Internet. Cloud services are delivered from data centers located throughout the world. Cloud computing facilitates its consumers by providing virtual resources via internet. The biggest challenge in cloud computing is the security and privacy problems caused by its multi-tenancy nature and the outsourcing of infrastructure, sensitive data and critical applications. Enterprises are rapidly adopting cloud services for their businesses, measures need to be developed so that organizations can be assured of security in their businesses and can choose a suitable vendor for their computing needs. Cloud computing depends on the internet as a medium for users to access the required services at any time on pay-per-use pattern. However this technology is still in its initial stages of development, as it suffers from threats and vulnerabilities that prevent the users from trusting it. Various malicious activities from illegal users have threatened this technology such as data misuse, inflexible access control and limited monitoring. The occurrence of these threats may result into damaging or illegal access of critical and confidential data of users. In this paper we identify the most vulnerable security threats/attacks in cloud computing, which will enable both end users and vendors to know a bout the k ey security threats associated with cloud computing and propose relevant solution directives to strengthen security in the Cloud environment. We also propose secure cloud architecture for organizations to strengthen the security. KEYWORDS Cloud Computing; Security and Privacy; Threats, Vulnerabilities, Secure Cloud Architecture. For More Details : http://airccse.org/journal/acij/papers/4113acij02.pdf Volume Link : http://airccse.org/journal/acij/vol4.html
  • 3. REFERENCES [1] "Swamp Computing" a.k.a. Cloud Computing". Web Security Journal. 2009-12-28. Retrieved 2010- 01-25. [2] "Thunderclouds: Managing SOA-Cloud Risk", Philip Wik". Service Technology Magazine. 2011-10. Retrieved 2011-21-21. [3] What cloud computing really means. InfoWorld. http://www.infoworld.com/d/cloudcomputing/what- cloud-computing-really-means-031?page=0,0 [4] Mell P, Grance T (2011) The nist definition of cloud computing (draft). http://csrc.nist.gov/publications/drafts/800–145/Draft-SP-800-145_cloud-definition.pdf [5] Ponemon (2011) Security of cloud computing providers study. http://www.ca.com/~/media/Files/ IndustryResearch/security-of-cloud-computing-providers-final-april-2011.pdf [6] Software as a service-Wikipedia. Wikipedia. http://en.wikipedia.org/wiki/Software_as_a_service [7] A. Tripathi and A. Mishra, “Cloud computing security considerations” IEEE Int. conference on signalprocessing, communication and computing (ICSPCC), 14-16 Sept., Xi'an, Shaanxi, China, 2011 [8] Vadym Mukhin, Artem Volokyta, “Security Risk Analysis for Cloud Computing Systems” The 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, Prague, Czech Republic, 15-17 September 2011 [9] Mathisen, “Security Challenges and Solutions in Cloud Computing” 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST2011) , Daejeon, Korea, 31 May -3 June 2011 [10]R. La‘Quata Sumter, ―Cloud Computing: Security Risk Classificationǁ, ACMSE 2010, Oxford, USA [11]Meiko Jensen ,Jorg Sehwenk et al., “On Technical Security,Issues icloud Computing ”IEEE International conference on cloud Computing, 2009. [12]M.Jensen ,N.Gruschka et al., “The impact of flooding Attacks on network based services”Proceedings of the IEEE International conference on Availiabilty,Reliability and Security (ARES) 2008. [13]Armbrust ,M. ,Fox, A., Griffth, R., et al “Above the clouds: A Berkeley View of Cloud Computing” , UCB/EECS-2009-28,EECS Department University of California Berkeley, 2009 http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.pdf [14]Wayne A. Jansen, ―Cloud Hooks: Security and Privacy Issues in Cloud Computingǁ, 44th Hawaii International Conference on System Sciesnces 2011. [15]Rituik Dubey et al., “Addressing Security issues in Cloud Computing”http://www.contrib.andrew.cmu.edu/~rdubey/index_files/cloud%20com puting.pdf [16]M. Okuhara et al., “Security Architecture for Cloud Computing”, www.fujitsu.com/downloads/MAG/vol46-4/paper09.pdf
  • 4. [17] “A Security Analysis of Cloud Computing” http://cloudcomputing.sys- con.com/node/1203943 [18] “Cloud Security Questions? Here are some answers”http://cloudcomputing.syscon.com/node/1330353 [19]Cloud Computing and Security –A Natural Match, Trusted Computing Group(TCG) http://www.trustedcomputinggroup.org [20] “Controlling Data in the Cloud:Outsourcing Computation without outsourcing Control http://www.parc.com/content/attachments/ControllingDataInTheCloud- CCSW-09.pdf [21] “Amazon Web services: Overview of Security processes “ September 2008 http://aws.amazon.com [22]T. Schreiber, “Session Riding a Widespread Vulnerability in Today'sWeb Applications” [Online], Available: http://www.securenet.de/papers/Session_Riding.pdf, white paper, 2004. [Accessed: 20-Jul- 2011]. [23]J., Grimes, P., Jaeger, J., Lin, “Weathering the Storm: The Policy Implications of Cloud Computing” [Online], Availablehttp://ischools.org/images/iConferences/CloudAbstract13109F INAL.pdf , [Accessed: 19-Jul-2011]. [24]B. Grobauer, T. Walloschek, and E. Stocker, “Understanding Cloud Computing Vulnerabilities,” Security & Privacy, IEEE, vol. 9, no. 2, pp.50-57, 2011. [25]A., Greenberg, “Why Cloud Computing Needs More Chaos” [Online],Available:http://www.forbes.com/2009/07/30/cloud-computing- security-technology- cionetwork-cloud-computing.html, 2009, [Accessed: 20-Jul-2011]. [26]Top 7 threats to cloud computing. HELP NET SECURITY. http://www.netsecurity.org/secworld.php?id=8943 [27]Rion Dutta, ”Planning for Single SignOn”, White Paper, MIEL e- Security Pvt [28]M. Armbrust, et al., A view of cloud computing. Commun. ACM. vol. 53 (2010), pp. 50-58 [29]Miranda Mowbray and Siani Pearson, A client-based privacy manager for cloud computing. In Proc. Fourth International Conference on Communication System Software and Middleware (ComsWare), Dublin, Ireland, 16-19 June 2009. AUTHORS Kashif Munir receives his BSc degree in Mathematics and Physics from Islamia University Bahawalpur in 1999. He received his MSc degree in Information Technology from University Sains Malaysia in 2001. He also obtained another MS degree in Software Engineering from University of Malaya, Mala ysia in 2005. His research area was in the field secure network for mobile devices, Cloud and pervasive computing. Mr. Kashif was the lecturer at Stamford College, Malaysia. Currently, he is Lecturer in the Computer Science & Engineering Unit at Hafr Al-Batin Community CollegeKFUPM, Saudi Arabia. He is doing his PhD at Malaysian University of Science and Technology, Malaysia.
  • 5. Prof. Dr. Sellappan Palaniappan is currently the Acting Provost and the Dean of Scho ol of Science and Engineering at Malaysia University of Science and Technology (MUST). Prior to joining MUST, he was an Associate Professor at the Faculty of Computer Science and Information Technology, University of Malaya. He holds a PhD in Interdisciplinary Information Science from the University of Pittsburgh and a Master in Computer Science from the University of London. Dr. Sellappan is a recipient of several Government research grants and has published numerous journals, conference papers and IT books. He has served as an IT Consultant for several local and international agencies such as the Asian Development Bank, the United Nations Development Programme, the World Bank and the Government of Malaysia. He has conducted workshops for companies. He is also an external examiner/assessor for several public and private universities. He was a member of IEEE (USA), Chartered Engineering Council (UK) and British Computer Society (UK), and is currently a member of the Malaysian National Computer Confederation (MNCC).
  • 6. AN APPROACH FOR BREAST CANCER DIAGNOSIS CLASSIFICATION USING NEURAL NETWORK Htet Thazin Tike Thein1 and Khin Mo Mo Tun2 1 Ph.D Student, University of Computer Studies, Yangon, Myanmar 2 Department of Computational Mathematics, University of Computer Studies, Yangon, Myanmar ABSTRACT Artificial neural network has been widely used in various fields as an intelligent tool in recent years, such as artificial intelligence, pattern recognition, medical diagnosis, machine learning and so on. The classification of breast cancer is a medical application that poses a great challenge for researchers and scientists. Recently, the neural network has become a popular tool in the classification of cancer datasets. Classification is one of the most active research and application areas of neural networks. Major disadvantages of artificial neural network (ANN) classifier are due to its sluggish convergence and always being trapped at the local minima. To overcome this problem, differential evolution algorithm (DE) has been used to determine optimal value or near optimal value for ANN parameters. DE has been applied successfully to improve ANN learning from previous studies. However, there are still some issues on DE approach such as longer training time and lower classification accuracy. To overcome these problems, island based model has been proposed in this system. The aim of our study is to propose an approach for breast cancer distinguishing between different classes of breast cancer. This approach is based on the Wisconsin Diagnostic and Prognostic Breast Cancer and the classification of different types of breast cancer datasets. The proposed system implements the island-based training method to be better accuracy and less training time by using and analysing between two different migration topologies. KEYWORDS Neural Network, Differential Evolution, Island Model, Classification, Breast Cancer Diagnosis For More Details : http://airccse.org/journal/acij/papers/6115acij01.pdf Volume Link : http://airccse.org/journal/acij/vol6.html
  • 7. REFERENCES [1] Arun George Eapen, master thesis, Application of Data Mining in Medical Applications, Waterloo, Ontario, Canada, 2004. [2] Choi J.P., Han T.H. and Park R.W., ―A Hybrid Bayesian Network Model for Predicting Breast Cancer Prognosisǁ, J Korean Soc Med Inform, pp. 49-57, 2009. [3] Hassanien Ella Aboul and Ali H.M. Jafar, ―Rough set approach for generation of classification rules of Breast Cancer data,ǁ Journal Informatica, vol. 15, pp. 23–38, 2004. [4] Jamarani S. M. h., Behnam H. and Rezairad G. A., ―Multiwavelet Based Neural Network for Breast Cancer Diagnosisǁ, GVIP 05 Conference, pp. 19-21, 2005. [5] A. Cichocki and R. Unbehauen, ‗‘ Neural Networks for optimization and signal processing,‘‘ J. Wiley, Sons Ltd. And B.G. Teubner, Stuttgart, 1993. [6] Abdelaal Ahmed, Mohamed Medhat and Farouq Wael Muhamed, ―Using data mining for assessing diagnosis of breast cnacer,ǁ in Proc. International multiconference on computer science and information Technology, pp. 11 -17, 2010. [7] Bellaachia Abdelghani and Erhan Guven, "Predicting Breast Cancer Survivability using Data Mining Techniques," Ninth Workshop on Mining Scientific and Engineering Datasets in conjunction with the Sixth SIAM International Conference on Data Mining,ǁ 2006. [8] Burke H. B. Et al, ―Artificial Neural Networks Improve the Accuracy of Cancer Survival Predictionǁ, Cancer, vol.79, pp.857-862, 1997 [9] R. Storn and K. Price, ―Differential evolution—A simple and efficient heuristic for global optimization over continuous spaces,ǁ J. Glob. Optim., vol. 11, no. 4, pp. 341–359, Dec. 1997. [10] K. V. Price, R. M. Storn, and J. A. Lampinen, Differential Evolution—A Practical Approach to Global Optimization. Berlin, Germany: SpringerVerlag, 2005. [11] Z. Skolicki and K. De Jong. The influence of migration sizes and intervals on island models. In GECCO‘05: Proceedings of the 2005 conference on Genetic and evolutionary computation, pages 1295- 1302, New York, NY, USA, ACM, 2005. [12] Breast Cancer Wisconsin Data [online]. Available: http://archive.ics.uci.edu/ml/machine- learningdatabases/breast-cancer-wisconsin/breast-cancer-wisconsin.data. [13] Dr. K. U. Rani, ―Parallel Approach for Diagnosis of Breast Cancer using Neural Network Techniqueǁ Int. J. of Computer. Application, vol. 10, no. 3, pp. 0975 – 8887, Nov. 2010. [14] Abdul Sttar Ismail Wdaa ― Differential evolution for neural networks learning enhancement ǁ J. of university of anbar for pure science: Vol.5: No.2: 2011. [15] Jun Zhang MS, Haobo Ma Md MS, ―An Implementation of Guildford Cytological Grading System to diagnose Breast Cancer Using Naïve Bayesian Classifierǁ, MEDINFO, M.Fieschi et al. (Eds), Amsterdam: IOS Press, 2004.
  • 8. [16] Kamruzzaman S.M. and Monirul Islam Md, ―Extraction of Symbolic Rules from Artificial Neural Networksǁ Proceedings of world Academy of science, Engineering and Technology, vol. 10, ISSN 1307- 6884, Dec. 2005. [17] Punitha A., Sumathi C.P. and Santhanam T., ―A Combination of Genetic Algorithm and ART Neural Network for Breast Cancer Diagnosisǁ Asian Journal of Information Technology 6 (1):112-117, 2007, Medwell Journals, 2007. [18] Rudy Setiono and Huan Liu, ―Neural-Network Feature Selectorǁ IEEE Transactions On Neural Networks, vol. 8, No. 3, pg 664-662, May 1997. [19] Wlodzislaw Duch and Rafal Adamczak and Krzysztof Grabczewski, ―A New methodology of Extraction, Optimization and Application of Crisp and Fuzzy Logic Rulesǁ IEEE Transactions On Neural Networks, vol. 12, No. 2, pp. 227-306, March 2001. [20] Anupam Shukla, Ritu Tiwari and Prabhdeep Kaur, ―Knowledge Based Approach for Diagnosis of Breast Cancerǁ IEEE International Advance Computing Conference, Patiala, India, pp. 6-12, March 2009. [21] Esugasini S, Mohd Yusoff Mashor, Nor Ashidi Mat Isa and Nor Hayati Othman, Performance omparison for MLP Networks Using Various Back Propagation Algorithms for Breast Cancer Diagnosis, Knowledge-Based Intelligent Information and Engineering Systems, Lecture Notes in Computer Science, 3682, pp. 123-130, 2005. [22] Paulin F. and Santhakumaran A., ―Extracting Rules from Feed Forward Neural Networks for Diagnosing Breast Cancerǁ CiiT International Journal of Artificial Intelligent Systems and Machine Learning, vol. 1, No. 4, pp. 143-146, July 2009. [23] D. Karaboga and S. Okdem, ―A simple and global optimization algorithm for engineering problems: Differential evolution algorithm,ǁ Turkish J. Elect. Eng. Comput. Sci., vol. 12, no. 1, pp. 53– 60, 2004.
  • 9. EFFECTIVE WAYS CLOUD COMPUTING CAN CONTRIBUTE TO EDUCATION SUCCESS BV Pranay kumar1 , Sumitha kommareddy2 and N.Uma Rani3 1,2 Department of information technology, CJITS, Jangaon, Warangal 3 Department of computer science and engineering, CJITS, Jangaon, Warangal ABSTRACT Cloud computing and education sounds ambiguous on the face of it. Naturally, it’s because, very few individuals, publishers and users alike come from the education sector. In most cases, cloud computing is only associated with businesses and how they can leverage their efficiencies. Just to introduce how the cloud deserves a place in our current education institution, it’s important to reiterate the education philosophy. Its essence is knowledge. It’s this knowledge which brings advancement, achievement and success. However, there are several things which make these parameters unattainable. In blunt language, this is failure. Small classrooms, lack or resources, short-handed staff, lack of adequate teachers…the list is endless. One way or the other, cloud computing can be utilized to improve education standards and activities. The end result will be to curb the above problems and instead, boost performance. KEYWORDS Cloud Computing, Web service, Virtualization, Grid Computing, Virtual Computing Lab, Higher education institutions, Remote areas. For more Details: http://airccse.org/journal/acij/papers/4413acij02.pdf Volume Link: http://airccse.org/journal/acij/vol4.html
  • 10. REFERENCES [1] C. Justin, B. Ivan, K. Arvind and A. Tom, Seattle: A Platform for Educational Cloud Computing, SIGCSE09, March 37, 2009, Chattanooga,Tennessee, USA, 2009. [2] P. Shanthi Bala, INTENSIFICATION OF EDUCATIONAL CLOUD COMPUTING AND CRISIS OF DATA SECURITY IN PUBLIC CLOUDS, (IJCSE) International Journal on Computer Science and Engineering Vol.02, No. 03, 2010, 741-745. 2007. [3] M. Armbrust, et al, Above the clouds: A Berkeley view of Cloud Computing, UC Berkeley EECS,2009. [4] S. Al Noor, G. Mustafa, S. Chowdhury, Z. Hossain, and F. Jaigirdar, A Proposed Architecture of Cloud Computing for Education System in Bangladesh and the Impact on Current Education System, (IJCSNS) International Journal of Computer Science and Network Security, VOL.10 No.10. 2010. [5] M. Luis, R. Luis, C. Juan and L. Maik, A Break in the Clouds: Towards a Cloud Definition, ACM SIGCOMM Computer Communication Review, Volume 39, Number 1. 2005. [6] Cloud Computing Articles. Cloud Computing Education, http://www.code2cloud.com/cloudcomputing-education/ [7] Cloud Computing Articles, SaaS+PaaS+IaaS. Free Cloud Apps for Educational Institutes: Schools, Colleges, Universities, http://www.technopulse. com/2010/08/free-cloud-apps-educationalinstitutes.html/ [8] IBM Academic Initiative. Cloud computing: Delivering Internetbased information and technology services in real time, https://www.ibm.com/developerworks/university/cloud/ [9] IBM Sales and Distribution - Solution Brief for Education. IBM Cloud Academy Education for a smarter planet, ftp://dispsd-40-www3.boulder.ibm.com/ [10] R. CJB and N. Evans. A PROPOSAL FOR THE ADOPTION AND USE OF CLOUD COMPUTING IN SECONDARY EDUCATION IN SOUTH AFRICA, 11th DIS Annual Conference 2010, 2nd 3rd September,Richardsbay, University of Zululand, South Africa, 2010. [11] THE ABC’S OF ENGINEERING EDUCATION: ABET, BLOOM’S TAXONOMY, COOPERATIVE LEARNING, AND SO ON [12] K. Youry and V. Volodymyr. Cloud Computing Infrastructure Prototype for University Education and Research, WCCCE ’10, May 78, 2010, Kelowna, Canad, 2010. [13] M. Grimes, T. Jaeger and J. Lin. Weathering the Storm: The Policy Implications of Cloud Computing, iConference, 2009. [14] Microsoft Education Cloud Computing. The most comprehensive solutions for the cloud. On earth, http://www.microsoft.com/en-us/cloud/ [15] Microsoft in Education — IT solutions. Microsoft Live@edu, http://www.microsoft.com/education/en-us/solutions/Pages/liveedu.aspx/
  • 11. [16] R. Elumalai and V. Ramachandran. A Cloud Model for Educational e-Content Sharing, European Journal of Scientific Research, ISSN 1450-216X Vol.59 No.2, pp.200-207. 2011. [17] N. Sultan. Cloud computing for education: A new dawn?, International Journal of Information Management, 109116, 30 2010. [18] M. Victoria, and D. Brbara. Cloud computing for education: A new dawn?, A design of a postgraduate course on Google Apps based on an Institutional Personal Learning Environment (iPLE). [19] Amazon Web Services. Overview of Amazon Web Services, http:==media:amazonwebservices:com=AWSOverview:pdf= [20] X. Dong and L. Hui. Reviewing some Cloud Computing Platforms, ISBN 978-952-5726-09-1, Proceedings of the Second International Symposium on Networking and Network Security (ISNNS 10), Jinggangshan, P. R., pp. 161-164, China. 2010. [21] An Amazon Web Services Case Study. Migrating Applications to the Cloud, http://www.cloudcomputingcourse.com/ [22] Amazon Web Services. AWS in Education, http://aws.amazon.com/education/ [23] MC Graw Hill. Cloud Computing Basics, Chapter 1. [24] IBM. New IBM Cloud Services to Address Education Challenges, http://www03.ibm.com/press/us/en/pressrelease/34642.wss/ [25] IBM Global Technology Services, Getting cloud computing right, http://www05.ibm.com/de/cloud/pdf/Gettingcloudcomputingright.pdf/ [26] IBM Sales and Distribution, Education, Solution Brief. IBM Virtual Computing Lab Solutions for Cloud, Solution Brief. [27] salesforce foundation. salesforce for Higher Education, http://www.salesforcefoundation.org/product/ [28] HP CLOUDSYSTEM. A single platform for private, public, and hybrid clouds. Simply the most complete cloud system for enterprises and service providers, Hewlett-Packard Development Company. 2011. [29] Amanda & Zmanda. Amanda and Zmanda Applications, http://www.zmanda.com/ [30] Zmanda Cloud Backup. Zmanda Cloud Backup for Windows, http://www.zmanda.com/cloudbackup.html/ [31] Cloud Computing. Risk of Cloud Computing in Universities, http : ==www:istf:jucc:edu:hk=newsletter=IT03=IT 3CloudComputing:pdf=[32] Microsoft, Education all in. Cloud Computing from Microsoft - Empowering Education through Choice, https://partner.microsoft.com/NZ/40142863/
  • 12. [33] P. Thomas. Cloud Computing: A potential paradigm for practicing the scholarship of teaching and learning, Centre for Academic Development, University of Botswana. [34] Microsoft, Cloud Computing Web Site. Cloud Computing in Education, http://www.edutechhosting.co.uk/ [35] A Microsoft U.S. Education white paper. Cloud computing in education Savings, flexibility, and choice for IT, http://www.microsoft.com/educloud/ [36] V. Toby, V. Anthony and E. Robert. Cloud Computing, A Practical Approach, ISBN-13: 978-0-07- 162694-1, 353 Pages. 2009. [37] R. Herrick. Google This! Using Google Apps for Collaboration and Productivity, SIGUCCS09, October 1114, 2009, St. Louis, Missouri, USA. 2009. [38] GOOGLE APPS EDUCATION EDITION. Google Apps Education Edition: communication, collaboration, and security in the cloud, http://www.google.com/a/edu/ [39] A. Vouk. Cloud Computing Issues, Research and Implementations, Journal of Computing and Information Technology - CIT 16, 2008, 4, 235246, doi:10.2498/cit.1001391. 2008. [40] Amazon Web Services (AWS) Web Site. What is AWS - A comprehensive cloud computing platform, http://aws.amazon.com/what-is-aws/ [41] Amazon Web Services, Case Study. Application Hosting, http://aws.amazon.com/solutions/casestudies/ [42] Amazon Web Services (AWS), EC2 Web Site. Amazon Elastic Compute Cloud (Amazon EC2), http://aws.amazon.com/ec2/ [43] AWS Case Study: Educations.com, Web Site. AWS Case Study: Educations. com, http://aws.amazon.com/solutions/case-studies/educationscom/ [44] D. Jiabin. Virtualization, Application Streaming and Private Cloud Computing in a Training Laboratory, JOURNAL OF SOFTWARE, VOL. 5, NO. 11,doi:10.4304/jsw.5.11.1306-1313. 2010. [45] N. Sclater. CLOUD COMPUTING IN EDUCATION: POLICY BRIEF, UNESCO Institute for Information Technologies in Education. 2010. [46] Cloud-onomics in education, IBM Cloud Academy, Web Site. Cloud 9: Future Compatible Computing in Education, http://www.ibm.com/ibm/files/T641866T23726I58/EBE03001USEN.PDF/ [47] Silanis e-SignLive Services. Software-as-a-Service (SaaS) e-Signature Service, http://www.eignlive.com/services.html/ [48] Salesforce.com foundation, Higher Education Solution. Taking higher education to a higher level, http://www.salesforcefoundation.org/products/discounts/higher-ed/
  • 13. [49] Salesforce:com foundation, Higher Education. The Real Time Cloud for Higher Education, http://www.salesforcefoundation.org/ [50] Cloud Computing Applications Web Site. Cloud Computing Applications and Services in Education, http://www.shaswatpatel.com/ [51] Microsoft News Center. Windows Azure and the Azure Services Platform: Making Microsofts Software-plus-Services Vision a Reality, http://www.microsoft.com/presspass/features/2008/oct08/10-27pdcfeature1.mspx/ [52] Computing Edge. Analyzing the Differences between Cloud Computingand Virtualization, http://computinged.com/insights/ [53] VCL Web Site. VCL Conceptual Overview Diagram, https://cwiki.apache.org/VCL/ [54] Understanding Cloud Computing in Education - Web Site. VCL Conceptual Overview Diagram, http://kasunpanorama.blogspot.com/2010/07/understanding-cloudcomputing- feel-easy.html/ [55] T. Harris. Cloud Computing Services - A comparison, http://www.thbs.com/ [56] IBM Cloud Academy. Education for a Smarter Planet:Cloud Computing in Education, http://www.cetpa-k12.org/
  • 14. DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY M. Mary Shanthi Rani1 , K.Rosemary Euphrasia2 1 Dept. of Comp. Sci. and Applications, Gandhigram Rural Institute, Deemed University Gandhigram, TamilNadu. India. 2 Department of computer Sci., Fatima College, Madurai, TamilNadu. India. ABSTRACT The art of information hiding has become an important issue in the recent years as security of information has become a big concern in this internet era. Cryptography and Steganography play major role for secured data transfer. Steganography stands for concealed writing; it hides the message inside a cover medium. Cryptography conceals the content of a message by encryption. QR (Quick Response) Codes are 2-dimensional bar codes that encode text strings. They are able to encode information in both vertical and horizontal direction, thus able to encode more information. In this paper a novel approach is proposed for secret communication by combining the concepts of Steganography and QR codes. The suggested method includes two phases: (i) Encrypting the message by a QR code encoder and thus creating a QR code (ii) Hiding the QR code inside a colour image. This hiding process embeds the quantised QR code so that it will not make any visible distortion in the cover image and it introduces very minimum Bit Error Rate (BER). Experimental result shows that the proposed method has high imperceptibility, integrity and security. KEYWORDS Steganography, QR code, BER For More Details : https://aircconline.com/acij/V7N2/7216acij01.pdf Volume Link : http://airccse.org/journal/acij/vol7.html
  • 15. REFERENCES [1] Ioannis Kapsalis., 2013. “Security of QR Codes“, Master thesis submitted in June 2013, Norwegian University of Science and Technology [2] Kinjal H. Pandyaand Hiren J. Galiyawala, 2014.” A Survey on QR Codes: in context of Research and Application”, International Journal of Emerging Technology and Advanced Engineering, Vol. 4 Issue 3.,pp. 258-262Ioannis Kapsalis., 2013. “Security of QR Codes“, Master thesis submitted in June 2013, Norwegian University of Science and Technology [3] QRStuff. QR Code Error Correction, 2011. QRStuff blog:http://www.qrstuff.Com /blog/2011/12/14/QR-code-error-correction. [4] Law, C. & So, S., 2010. “QR codes in education. Journal of Educational Technology Development and Exchange”, Vol. 3 Issue 1, pp. 85-100 [5] Shruti Ahuja, 2014. ” QR Codes and Security Concerns”, International Journal of International Journal of Computer Science and Information Technologies, Vol. 5 Issue 3 pp. 3878-3879 [6] Akshara Gaikwad et al, 2015. “Information Hiding using Image Embedding in QRCodes for Colour Images: A Review”, International Journal of Computer Science and Information Technologies, Vol. 6 Issue 1,pp. 278-283 [7] Dipika Sonawane et al., 2014. “QR based Advanced authentication for all hardware platforms “International Journal of Scientific and Research Publications, Vol. 4(1) pp.1-4 [8] www. The-qrcode-generator.com [9] ZXing, “Decoder Online,” 2011, http://zxing.org/w/decode.jspx [10] M. Mary Shanthi Rani and K.Rosemary Euphrasia, 2015. “Dynamic Hiding of Message in RGB Domain based on Random Channel Indicator”, International Journal of Applied Engineering Research, Vol.10 No.76., pp. 478-483
  • 16. AUTHORS Dr.M. Mary Shanthi Rani, a NET qualified Assistant Professor in the Department of Computer Science and Applications, Gandhigram Rural Institute (Deemed University), Gandhigram has twelve years of teaching and eight years of research experience as well. She has nearly twenty publications in International Journals and Conferences. Her research areas of interest are Image Compression, Information Security, Ontology, Biometrics and Computational Biology. She has authored a book titled “Novel Image Compression Methods Based on Vector Quantization” and is one of the editors of Conference Proceedings “Recent Advances in Computer Science and Applications”. S he has served in various academic committees in designing the curriculum for B.Sc. and M.C.A courses as well. She has also served as reviewer of Peer-reviewed International Journals and Conferences and is a Life member of Indian Society for Technical Education. She has the credit of being the Associate Project Director of UGC Indo-US 21st Knowledge Initiative Project. Ms. K.Rosemary Euphrasia Associate Professor in Computer Science, Fatima College, Madurai. She received B.Sc., and M.Sc., degrees in Physics and M.Phil. degree in Computer scien ce. She has 20 years of teaching experience in computer science. She is now studying towards her Ph.D. degree in Computer science at Gandhigram Rural Institute – Deemed University, Gandhigram, Tamilnadu, India. Her area of research is information security through video steganography.
  • 17. IMPROVING PRIVACY AND SECURITY IN MULTITENANT CLOUD ERP SYSTEMS Djamal Ziani and Ruba Al-Muwayshir Department of Information Systems, King Saud University, Riyadh, Saudi Arabia ABSTRACT This paper discusses cloud ERP security challenges and their existing solutions. Initially, a set of definitions associated with ERP systems, cloud computing, and multi-tenancy, along with their respective challenges and issues regarding security and privacy, are provided. Next, a set of security challenges is listed, discussed, and mapped to the existing solutions to solve these problems. This thesis aims to build an effective approach to the cloud ERP security management model in terms of data storage, data virtualization, data isolation, and access security in cloud ERP. The following proposed techniques are used to improve the security for multi-tenant SaaS: database virtualization, implementation of data encryption and search functionality on databases and developed systems, distribution of data between tenant and ERP providers, secure application deployment in multi-tenant environments, implementation of the authentication and developed systems together as a two-factor authentication, and improved user access control for multi-tenant ERP clouds. KEYWORDS ERP, ERP system, ERP problems, ERP security challenges, ERP security solutions, ERP and cloud computing For More Details : http://aircconline.com/acij/V8N5/8517acij01.pdf Volume Link : http://airccse.org/journal/acij/vol8.html
  • 18. REFERENCES [1] M.A. Vouk, (2008) “Cloud computing–issues, research and implementations”, CIT. Journal of Computing and Information Technology, Vol. 16, No. 4, pp235-246. [2] A. Patel & M. Kumar, (2013) “A Proposed Model for Data Security of Cloud Storage Using Trusted Platform Module”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, No. 4. [3] D.P.D.S. Abburu, (2012). “An Approach for Data Storage Security in Cloud Computing”, IJCSI International Journal of Computer Science Issues, Vol. 9, No. 2. [4] M. Almorsy, J. Grundy, & A.S. Ibrahim, (2012, June) “Tossma: A tenant-oriented saas security management architecture”, In Cloud computing (cloud), 2012 IEEE 5th international conference on (pp. 981-988). IEEE. [5] S. Subashini & V. Kavitha, (2010), “A Survey on Security Issues in Service Delivery Models of Cloud Computing”, Journal of Network and Computer Applications, Vol. 34, No.1, pp1 -11. [6] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R. Katz, Konwinski, A., ... & M. Zaharia, (2010) “A view of cloud computing”, Communications of the ACM, 53(4), 50-58. [7] A. Azeez, S. Perera, D. Gamage, R. Linton, P. Siriwardana, D. Leelaratne, ... & P. Fremantle, (2010, July), “Multi-tenant SOA middleware for cloud computing”, In Cloud computing (cloud), 2010 ieee 3rd international conference on (pp. 458-465). IEEE. [8] D. Banks, J. Erickson, & M. Rhodes, (2009), “Multi-tenancy in cloud-based collaboration services”, Information Systems Journal. BCG (2012). [9] M. Armbrust et al., (2009), “A view of cloud computing”, Communications of the ACM, 53(4), p.50. Available at: http://inst.cs.berkeley.edu/~cs10/fa10/lec/20/2010-11-10-CS10-L20-AF-Cloud Computing.pdf [Accessed July 30, 2012]. [10] S.L. Dinesh Kumar Saini, Yousif,, J.H. Sandhya, & V. Khandage, (2011), “Cloud Computing and Enterprise Resource Planning Systems”, Proceedings of the World Congress on Engineering, Vol. 4. [11] D. Harnik, B. Pinkas, A. Shulman-Peleg, (2010), “Side channels in Cloud services: deduplication in Cloud Storage”, IEEE Security Privacy, Vol. 8, No. 6, pp40–47. [12] E. Fathi Kiadehi, & S. Mohammadi, (2012), “Cloud ERP: Implementation of Enterprise Resource Planning Using Cloud Computing Technology”, Journal of Basic and Applied Scientific Research, Vol. 6. [13] U. Somani, K. Lakhani, M. Mundra, (2010), “Implementing digital signature with RSA encryption algorithm to enhance the data Security of Cloud in Cloud Computing”, In: 1st International conference on parallel distributed and grid Computing (PDGC), IEEE Computer Society Washington, DC, USA, pp211–216. [14] G. F Fathima Haseen Raihana & J. A. Jamal Mohamed College, (2012), “CLOUD ERP– A SOLUTION MODEL”, IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS), ISSN, Vol. 2, No. 4, pp4.
  • 19. [15] S. Xiao & W. Gong, (2010), “Mobility Can help: protect user identity with dynamic credential”, In: Eleventh International conference on Mobile data Management (MDM), IEEE Computer Society, Washington, DC, USA, pp378–380. [16] R. Mietzner, T. Unger, R. Titze, & F. Leymann, (2009), “Combining Different Multi-Tenancy Patterns in Service Oriented Applications,” presented at the IEEE Enterprise Distributed Object Conference, Auckland. [17] E. Kimberling, (2011), “Is SaaS ERP right for your organization,” 360° ERP Blog. [18] A. Lenart, (2011), “ERP in the Cloud–Benefits and Challenges”, In Research in systems analysis and design: Models and methods, pp39-50, Springer Berlin Heidelberg. [19] Md Asif Mushtaque, R. Sindhu, (2014), “A New Innovation On User’S Level Security For Storage Data In Cloud Computing”, International Journal of Grid Distribution Computing 7.3, pp213-220. [20] J. Müller, J. Krüger, S. Enderlein, M. Helmich, & A. Zeier, A, (2009), “Customizing enterprise software as a service applications: Back-end extension in a multi-tenancy environment”, In Enterprise Information Systems, pp66-77. Springer Berlin Heidelberg. [21] S. Na, K. Kim, & E. Huh, (2013), “A Methodology for Evaluating Cloud Computing Security Service-Level Agreements”, International Journal of Advancements in Computing Technology (IJACT), Vol. 5, No. 13. [22] R. Muhleman, P. Kim, V. J. Homan, & J. Breese-Vitelli, (2012), “Cloud Computing: Should I Stay or Should I Cloud?”, presented at the Conference on Information Systems Applied Research, New Orleans Louisiana, USA. [23] M. Okuhara, T. Shiozaki, & T. Suzuki, (2010), “Security architecture for cloud computing”, Fujitsu Sci. Tech. J, Vol. 46, No. 4, pp397-402. [24] Z. Pervez, S. Lee, & Y.K. Lee, (2010, February), “Multi-tenant, secure, load disseminated SaaS architecture”, In Advanced Communication Technology (ICACT), 2010 The 12th International Conference on (Vol. 1, pp214-219). IEEE. [25] P.S. Petra Schubert, & A.F. Femi Adisa, (2011), “Cloud Computing for Standard ERP Systems: Reference Framework and Research Agenda”, Arbeitsberichte aus dem Fachbereich Informatik, Vol. 4, No. 27, pp29. [26] L. Qian, Z. Luo, Y. Du, & L. Guo, L, (2009), “Cloud computing: An overview”, In Cloud Computing, pp626-631. Springer Berlin Heidelberg. [27] G. Reddy & N. Subashini, (2014), “Secure Storage Services and Erasure Code Implementation in Cloud Servers”, International Journal of Engineering Research & Technology (IJERT), Vol. 3, No. 1, pp1810-1814. [28] P. Hofmann, (2010), “Cloud Computing: The Limits of Public Clouds for Business Applications”, IEEE Internet Computing, Vol.. 14, No. 6, pp90–93. [29] A. Satapathy, & J. Badajena, (2013), “A Secure Model and Algorithms for Cloud Computing based on Multicloud Service Providers”, International Journal Computational Intelligence and Informatics, Vol. 3, No. 1. [30] B. McCrea, “Putting the spotlight on ERP,” Logistics Management, pp32 – 35, Jun-2011.
  • 20. [31] Y. Xu, N. Rahmati, & V. Lee, (2008, June), “A review of literature on Enterprise Resource Planning systems”, In Service Systems and Service Management, 2008 International Conference on (pp1-6). IEEE. [32] S. Salleh, S. Maliza, T. Yen, & C. Chan, (2012), “Cloud Enterprise Systems: A Review of Literature and its Adoption”, presented at the PACIS 2012 Proceedings, Hochiminh City, 2012. [33] J. Esteves, & J. Pastor, (2001), “ENTERPRISE RESOURCE PLANNING SYSTEMS RESEARCH: AN ANNOTATED BIBLIOGRAPHY”, Communications of AIS, Vol. 7, No. 8. [34] N. Sahin, (2013), “Cloud ERP Security: Guidelines for Evaluation”, Department of Computer and Systems Sciences. [35] J. Umble, R. Ronald, M. Haft, & U. Michael, (2003), “Enterprise resource planning: Implementation procedures and critical success factors”, European Journal of Operational Research, Vol. 146, pp241–257. [36] X. Xun, (2012), “From cloud computing to cloud manufacturing”, Robotics and Computer- Integrated Manufacturing Vol. 28, pp75–86. New Zealand. [37] S. Walraven, E. Truyen, W. Joosen, F. Kon, & A. Kermarrec, (2011), “A Middleware Layer for Flexible and Cost-Efficient Multi-tenant Applications”, IFIP International Federation for Information Processing, pp370–389. [38] W. Voorsluys, J. Broberg, & R. Buyya, (2011), “Introduction to cloud computing”, Cloud computing: Principles and paradigms, 2-44. [39] L. Bangfan, Z. Huihui, & W. Meng, (2014), “How to Design the Cloud Computing Used in Egovernment’s Information Security?”, Applied Mechanics and Materials, Vol. 536-537, pp616-619. [40] A. Bezemer & C. P., Zaidman. (2010), “Multi-tenant SaaS applications: maintenance dream or nightmare?”, in In Proceedings of the Joint ERCIM Workshop on Software Evolution (EVOL) and International Workshop on Principles of Software Evolution (IWPSE), pp88–92. [41] M. Kapuruge, A. Colman, J. Han, A. Bouguettaya, M. Hauswirth, & L. Liu, L, (2011), “Achieving Multi-tenanted Business Processes in SaaS Applications”, Springer-Verlag Berlin Heidelberg. pp143– 157. [42] E. Shehab, M. Sharp, L. Supramaniam, & T Spedding, (2004), “Enterprise resource planning An integrative review”, Business Process Management Journal, Vol. 10 No. 4. [43] J. Ju, Y. Wang, J. Fu, J. Wu, & Z. Lin, (2010), “Research on Key Technology in SaaS”, in 2010 International Conference on Intelligent Computing and Cognitive Informatics, pp. 384–387. [44] H. Wang & Z. Zheng, (2010), “Software architecture driven configurability of multi-tenant SaaS application”, in Web Information Systems and Mining (WISM), 2010, pp418–424. [45] D. Johnson, (2010), “Multi-tenant versus Single-tenant ERP – a comparison,” [Online]. Available: http://erpcloudnews.com/2010/06/multi-tenant-versus-single-tenant-erp-a-comparison/. [Accessed: 28- Aug-2013]. [46] D. Banks, J. Erickson, & M. Rhodes, (2009), “Multi-tenancy in Cloud-based Collaboration Services”, Hewlett-Packard Development Company, L.P.
  • 21. AUTHORS Djamal Ziani has been an associate professor in the Computer Sciences and Information Systems College at King Saud University since 2009. He is also a researcher in ERP and a member of the data management group of CCIS, King Saud University. He received a Master’s degree in Computer Sciences from the University of Valenciennes, France in 1992, and Ph.D. in Computer Science from the University of Paris, Dauphine, France in 1996. From 1998 to 2009, he was a consultant and project manager in many companies in Canada, such as SAP, Bombardier Aerospace, and Montreal Stock Exchange. Ruba Almuwayshir is a teaching assistant at AlJouf University and a master’s student at King Saud University.