New user registration
Event organizer registration
Login via your institution account
Login via your organization account
Login via your publisher account
Login using your new user credentials
Forgot username or password?
Subscribe to SciArchives
Computer Science >
Computer Science (General)
International Journal of Distributed and Cloud Computing
Publisher:Publishing India Group
Editor in chief:Dr. Pooja Taneja
Your selection(s) could not be saved due to an internal error. Please try again.
Browse by Volumes
Mobile Cum Web Based Voting System For Rural Areas In India
Author:Gaurav D. Barokar Chandrashekhar M. Mankarharshal D. Gurad
Volume: 1 | Issue no: 2-2013 | Pagination: 31-33
Elections are main and very important part of our daily life. Unlike any other transactional event, the result of elections can have many positive and/or negative effects on these communities and their wellbeing. In Asian countries like India there are lots of problems in the election, such as there is no proper road developed so that voter or election committee can reach up to the election booth. In some places, fake voters are created or by forcing the voter to give vote for a fix candidate. So to overcome these drawbacks we build proper and trusted (transparent) voting system. This paper details the requirements, design and implementation of a e-voting system and held various election campaigns simultaneously and permits voters to cast their votes in the specific elections at anytime (anytime voting), from any-location (anywhere voting).
Security Enhanced Multi Level Authentication For Cloud
Author:Vishal Vijay Saswade, S. M. Bansode
Volume: 1 | Issue no: 2-2013 | Pagination: 27-30
Cloud Computing provide a delivery of scalable IT resources over the Internet as opposed to hosting and operating those resources locally such as on a college or university network. Resources like applications and services, as well as the infrastructure on which they operate. Cloud providers specialize in particular applications and services, and this expertise allows them to efficiently manage resources like applications and services, expertise allows them to efficiently manage, upgrades and maintenance, backups, disaster recovery and Failure functions upgrasources locally, such as on a college or uscalable IT rdes and maintenance, backups, disaster recovery, and failover functions. Cloud computing  encourages IT organizations and providers to increase standardization of protocols and processes so that the many pieces of the cloud computing  model can interoperate properly and efficiently. Concern about identity theft, data breaches and fraud is increasing but at the same time organizations are feeling pressure to enable employees, partners and customers to access more sensitive information from anywhere and any device. These market dynamics make multi-factor authentication  and fraud prevention critical parts of any organization's security strategy Cloud computing has been around for over some years in different forms. However the third generation trend in IT industry is now ruled over by cloud computing. Cloud services require Attestation and different models of Attestation have been proposed over the years. Two Factor Attestation technique contains a two layer Attestation system, where the first layer contains user name and password and second layer contains tokens and pins."Cloud" is a virtualized pool of computing resources. Two of them are : Multifactor Attestation (MFA)  contains more than one form of Attestation that is implemented to verify the legitimacy of a user.In this paper, we will be discussing our proposed model for multi level Attestation and compare the existing models with the proposed one.
An Additional Security Layer In The Implementation Of Saas (Software As A Service) - A Survey
Author:Laxmi Arun, Divyalakshmi V. L, Sharmila P, Rakshitha S, Amith Jacob
Volume: 1 | Issue no: 2-2013 | Pagination: 24-26
With the advent of web and the concerned technologies the end users can generate or share any number of documents. A service such as collaborative edition of online documents is commonly provided through Cloud Computing as Software as a Service. However, the Cloud paradigm requires the end user's to trust their service providers. Nowadays companies provide infrastructure facilities such as storage space, processing capacity, applications, etc., for user's and companies. When confidential information of user's or that of a company is stored on such remote places there are chances of security breaches. This fact discourages companies and users to adopt to cloud services. To counter this drawback, in this paper we propose a solution for this problem by providing an additional user layer for Microsoft Azure Documents. In our paper, we have used a supplement layer to the existing user layer in the browser. This layer encrypts the data before storing it on the server. Accessing the information is impossible without the right password.
Service-Oriented Multi-Agent Data Intensive Architecture For Biomedical Cloud
Author:S. S. Patra, R. K. Barik
Volume: 1 | Issue no: 2-2013 | Pagination: 16-23
Cloud Computing brings out a modern approach which allows us to develop dynamic, distributed and highly scalable software. It provides services and computing through the networks. Service-Oriented Architecture (SOA) and agent frameworks furnishes tools for developing distributed and multi-agent systems which can be used for the administration of cloud computing environments which supports the above characteristics. This paper presents a SOQM (Service-Oriented Qos-Assured and Multi-Agent Cloud Computing) architecture which includes physical device and virtual resource layer, cloud service provision layer, cloud service management and multi-agent layer to support QoS assured cloud service provision and request. SOQM has been applied to the analysis of biomedical data and has allowed the efficient management of the allocation of resources to the different system agents. It has proposed a finite multi server model where the virtual machines are provisioned depending on the customers in the system.
A Comparative Study Of Load Balancing Algorithms In Cloud Computing Environment
Author:Mayanka Katyal, Atul Mishra
Volume: 1 | Issue no: 2-2013 | Pagination: 6-10
Cloud Computing is a new trend emerging in IT environment with huge requirements of infrastructure and resources. Load Balancing is an important aspect of cloud computing environment. Efficient load balancing scheme ensures efficient resource utilization by provisioning of resources to cloud user's on-demand basis in pay-as-you-say-manner. Load Balancing may even support prioritizing users by applying appropriate scheduling criteria. This paper presents various load balancing schemes in different cloud environment based on requirements specified in Service Level Agreement (SLA).
Design Paper On Cloud-Based Performance Testing
Author:Nisha Ameya Vanjari, Seema Shah
Volume: 1 | Issue no: 2-2013 | Pagination: 1-4
Performance testing is used for testing the risk to application and technology. It requires web server and database server within infrastructure. In this paper, we designed different scenarios which include on-premise, infrastructure partly and completely deployed on cloud. Specifi cally three scenarios we have compared are onpremises, database in cloud and web application with database in cloud. The objective of this design paper is to identify the applicability of these three scenarios to different contexts. The key parameters of performance measurement like response time and throughput have been captured and analyzed to meet the objective mentioned.
Public Or Private: Which Cloud Computing Model Suits Your Business
Volume: 1 | Issue no: 1-2013 | Pagination: 43-44
Cloud technology is the need of the hour. If you're a small, mid-sized or a large organization, planning for a cloud, then this article is just for you. This article will guide you and help you in decision making, which cloud model would suit your business needs. Before making a decision on a cloud, the questions that go through the minds of CEOs and other decision makers are: Whether to implement public or private cloud What's the difference between public and private cloud Which model would be more suitable This communication answers all these questions and provides a framework, methodology and strategy for selecting the best cloud solution for your business.
A Priority Constrained Pre-Emptive Scheduling Of Online Real Time Services With Fixed Checkpoint Intervals For Cloud Computing
Author:Santhosh R, Ravichandran T
Volume: 1 | Issue no: 1-2013 | Pagination: 38-41
In cloud computing, various services are accessed by the different types of clients as pay per use over the internet. This paper presents a new scheduling technique for real time tasks in order to minimize the execution time and focuses on the priority constrained tasks. In older approaches, a non-preemptive scheduling with task migration algorithm is used to schedule the task with highest expected gain and executes the tasks in the queue in a non-preemptive manner. Therefore it increases the execution time of the task and response time of the priority constrained tasks. In order to overcome this problem, a priority constrained pre-emptive scheduling of online real time services with fixed checkpoint intervals is proposed to minimize the execution time of the tasks and improves the overall system performance by giving importance for higher priority tasks. Our simulation results outperform the traditional scheduling algorithms based on the similar model.
Cloud-Based Performance Testing Of Web Application
Author:Nisha Ameya Vanjari, Seema Shah
Volume: 1 | Issue no: 1-2013 | Pagination: 33-36
Performance testing is used for testing the risk to application and technology. It requires web server and database server within infrastructure. In this paper, we compared different scenarios which include onpremise, infrastructure partly and completely deployed on cloud. Specifically three scenarios we have compared are on-premises, database in cloud and web application with database in cloud. The objective of this comparison is to identify the applicability of these three scenarios to different contexts. The key parameters of performance measurement like response time and throughput have been captured and analyzed to meet the objective mentioned. It is an initial step to provide direction and basis for identifying appropriate use of cloud for web applications.
Embedded Sensing Module For Real Time Remote Monitoring Applications
Volume: 1 | Issue no: 1-2013 | Pagination: 29-31
Monitoring the various parameters is very crucial in the field of real time remote sensing area. Considering the wide potential applications of this field the present paper details the smart sensing array for the remote monitoring applications. This is implemented with a number of high-performance front-end circuits for various types of sensors. Sensors elements can be directly connected without the need of extra circuits. The present available sensor interface allows a limited 4 to 5 sensors at input. The present paper describes development and typical features of a low-cost, highperformance interface. All parameters and set point values are displayed on LCD and are stored in external EEPROM for future reference. The developed system can be connected to a host Personal Computer using wired RS-232 interface and wireless (IEEE 802.51.4) connectivity using the Xbee-PRO-PKG RF modem.
Contact and support
Terms and conditions
Frequently asked questions
Copyright © 2015
All rights reserved. SciArchives.