SlideShare a Scribd company logo
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume: 3 | Issue: 3 | Mar-Apr 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 - 6470
@ IJTSRD | Unique Paper ID – IJTSRD23094 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 856
Transforming the Data into Virtual
Set-Up Segmented usage and Adoption
Dr. R. Poorvadevi
Assistant Professor, CSE Department, SCSVMV University, Kanchipuram, Tamil Nadu, India
How to cite this paper: Dr. R.
Poorvadevi "TransformingtheDatainto
Virtual Set-Up Segmented usage and
Adoption" Published in International
Journal of Trend in Scientific Research
and Development
(ijtsrd), ISSN: 2456-
6470, Volume-3 |
Issue-3 , April 2019,
pp.856-858, URL:
https://www.ijtsrd.c
om/papers/ijtsrd23
094.pdf
Copyright © 2019 by author(s) and
International Journal of Trend in
Scientific Research and Development
Journal. This is an Open Access article
distributed under
the terms of the
CreativeCommons
Attribution License (CC BY 4.0)
(http://creativecommons.org/licenses/
by/4.0)
ABSTRACT
In digitalized environment, heterogeneous users are host and deploy their
applications as a digital transformation. As the growing of dynamic business
requirements, the operational values of service level agility, scaling and
availability of resources are the more focusing components. However,
enterprises are needed to deliver the data with atmost desired security value to
its genuineness users. All the client level processes are initiated by verifying the
strong security level access parameters. So, it is important to process the data
migration with the adopted cloud vendors. Lots of securitybreachesarecausing
the data level protection in the service access environment. The proposed work
will implement the secured transformation user’s data, applications, and
resources to the desired virtual set-up in order to strengthen the customer’s
application. The approach will be used to finding the service adoption by
verifying the level of service guaranty with the cloud vendor adoption.
KEYWORDS: Data migration, Cloud adoption, cloud vendor, data segmentation,
cloud service provider, Virtual set-up, cloud client, Security breaches.
1. Introduction
Cloud framework has the challenges for fundamentals of
security which are isolation and segmentation. Moving
applications and data from fully self-controlled to third
party-controlled realms poses a significant cyber security
concern to most enterprises. IT and security teams
rigorously assess applications on a case by case basis before
they are moved to the cloud – especially applications which
create, process, and store sensitive data. As a best practice
for cloud adoption, the less criticalapplicationsaremoved to
the cloud first, with the assumption that this reduces the
security risk and allows gaining experience..Attackerstoday
use sophisticated techniques, not only to steal data, but also
to compromise the systems to create bot networks. This
eventually robs the enterprise with excessive cloud billing
and potentially opens the door to access more sensitive
applications which are on-premise. These are some of the
reasons why cloud adoption is a slow and carefulprocessfor
most enterprises.
2. Literature Study
An author Paulo Rupino da Cunha, et.al, “Avoiding Lock-In:
Timely Reconfiguration of a virtual cloud Platformon Topof
Multiple PaaS and IaaS Providers”. This paper has mainly
focused on virtual cloud platform creation for multiple level
of PaaS and IaaS service provider. All the lock-incontrols are
reconfigured with cloud underlying architecture. [1]
Zhengping Liang et.al, “Security of virtual working
on cloud computing platform”. This paper has implemented
the security metrics for the various cloud user applications.
Determined the virtual set-up process for all the cloud
service provider data sources. [2]
Pongsakorn U-chupala et. al, “An implementation of a multi-
site virtual cluster cloud”. This paper proposed a novel
approach of multi site user application transformed to the
virtual cluster groups by specifying the access level policies,
data protection in the service platform.[3]
So, from the analysis of background work all the security
level implementations were considered and processed into
the different cloud adoption. There arenospecificstandards,
access policies are formed for the data migration.
3. Proposed Work
Accelerating the cloudapplicationtothemicrosegmentation
will process the application, data level functions the digital
transformation level to mitigate the security policies with
the compromising security parametric values. The various
client service specific applications were examinedunderthe
machine –critical applications and finding the enterprises to
secure the entire client level resources tobesegmented with
the cloud user adoption level. External threats also to be
IJTSRD23094
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID - IJTSRD23094 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 857
notified with the security perimeter control to process and
regulate the traffic between the access policies. Internal
networks, technologies are combined with the data
segmentation policy level to produce the application
migration and content specific process over the
transformation levels.
The following are the needs for transforming data to the
virtual setup for the cloud user and enterprise applications
which is listed below:
Modernize Current IT asset base
Prepare for future needs
Lower infrastructure costs
Increase Business agility
Disaster Recovery Security
The major concern for transformation of data to the virtual
setup is data gravity. The cloud infrastructure will explicitly
specify the data abstraction for the user applications.
Integration of business segments to the varioususergroups.
It also finds the customized time factor for transforming of
any client level resources to the virtual environment.
Fig: 1 proposed system architecture
An above diagram will (fig1) depicts the functional process
of iterating the applications and client’s data in the
virtualized environment. All the genericprocesswillanalyze
the micro level segmentation task in thecloud infrastructure
platform to specify the level of segmented data usage.
4. Implementation Work
Customizing the data integration among the cloud vendors
will specify to locate the users application in the secured
platform by maintaining the data management policies and
application mobility and also improving the governance.
The main issue is that every application complicates data
management by introducing elements of application logic
into the data management tier, and each one is indifferentto
the next data use case. Business processes use data in
isolation and then output their own formats, leaving
integration for the next process. Therefore, application
design, data architecture, and business processes must all
respond to each other, but often one of these groups is
unable or unwilling to change. This forces application
administrators to sidestep ideal and simple workflows,
resulting in suboptimal designs. And, although the
workaround may have been necessary at the time, this
technical debt must eventually be addressed during data
migration or integration projects
Fig: 2 Process of Data migration in Virtual set-up
All the generic process is built on the application
environment and identification of client level security
parameters are evaluated with the virtual key ID values.
However, entire transaction of client’s information is also
migrated with the specific cloud vendor platform. The
following are the various strategicprocessesareverified and
demonstrated in the virtualized environment. The key
logger’s data has been identified by encrypting the correct
key values in the client access platform. The following table
shows the sample identified results for the application
transformation to the virtual setup which is listed below:
Service
Process ID
Migrated
Environment
Cloud
adoption
status
Process
efficiency
(%)
ID –709 AWS Processd 89.23
ID - 15.267 GAE optimizd 94.3
ID - 53.083 Sales force verified 97.16
ID –67.1
Microsoft
Azure cloud
processd 99.03
ID –48.2 EC2 Processd 99.42
Table: 1 depicting the migration process outcome
The above table process the significant role of application
migration to the requested user access zone. All the generic
processes are evaluated under the desired service
environment. This table show that, how the migration has
taken place for the various service access platforms.
5. Experimental Results
The user application process isdemonstratedfor the various
migration policies to evaluate the service migrationprocess.
Segmented data has been adapted to the cloud vendor
location and process the migration level access constraints
along the service environment.Toenabletheserviceprocess
for the various cloud user applications virtualized
environment credentials are investigated with the specific
user level access information.
Fig: 3 Process of Transformation of user application to the
virtual environment
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID - IJTSRD23094 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 858
6. Conclusion
From the migration perspective all the user access level
constraints are verified for the applications transformation
to the virtualized environment. All the security components
are iterated with the specific functional parameters for
segmenting the data into the concern and schematic cloud
adoption mechanism.
References:
[1] Paulo Melo ; Catarina FerreiradaSilva, :AvoidingLock-
In: Timely Reconfiguration of a virtual cloud Platform
on Top of Multiple PaaS and IaaS Providers”,
International conference on Cloud Computing, Year:
2013, Pages: 970 – 971
[2] ZhengpingLiang ; SongsongJia ; JianyongChen ; Pengfu
Chen, “Security of virtual working on cloud computing
platform”,2012 IEEE Asia Pacific cloud Computing
Congress (APCloudCC),Year: 2012, Pages: 72 – 75
[3] Pongsakorn U-chupala ; Putchong Uthayopas ; Kohei
Ichikawa ; Susumu Date ; Hirotake Abe, “An
implementation of a multi-site virtual cluster cloud ”,
The 2013 10th International Joint Conference on
Computer Science and Software Engineering (JCSSE),
Year: 2013, Pages: 155 - 159
[4] Qi Zhang ; Ling Liu ; Calton Pu ; Qiwei Dou ; Liren
Wu ; Wei Zhou, “A Comparative Study of Containers
and virtual Machines in Big Data Environment”,2018
IEEE 11th International Conference on
Cloud Computing (CLOUD), Year: 2018, Pages: 178 –
185
[5] Subhadra Bose Shaw ; Jay Prakash Kumar ; AnilKumar
Singh, “Energy-performance trade-off through
restricted virtual machine consolidation in cloud data
center”, 2017 International Conference on Intelligent
Computing and Control (I2C2), Year:2017, Pages: 1 – 6
[6] Fanqiang ; Xiaoxia Xu ; Libo cui, “The research about
modeling technology of irregular virtual reality scene
based on point cloud data”, 2010 International
Conference on Computer Application and System
Modeling (ICCASM 2010), Year: 2010 , Volume: 6
Pages: V6-538 - V6-541
[7] D. Maria Manuel Vianny ; M. Aramudhan ; G.
Ravikumar, “Effective binary cuckoo search
optimization based cloud brokering mechanism
on cloud”, 2017 International Conference on IoT and
Application (ICIOT), Year: 2017, Pages: 1 - 8
Ad

More Related Content

What's hot (19)

Overview of cloud computing architecture service
Overview of cloud computing architecture serviceOverview of cloud computing architecture service
Overview of cloud computing architecture service
eSAT Publishing House
 
Overview of cloud computing architecture
Overview of cloud computing architectureOverview of cloud computing architecture
Overview of cloud computing architecture
eSAT Journals
 
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud Computing
IJMER
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
 
Authenticated and unrestricted auditing of big data space on cloud through v...
Authenticated and unrestricted auditing of big data space on  cloud through v...Authenticated and unrestricted auditing of big data space on  cloud through v...
Authenticated and unrestricted auditing of big data space on cloud through v...
IJMER
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET Journal
 
IRJET- Effective Privacy based Distributed Storage Structure
IRJET- Effective Privacy based Distributed Storage StructureIRJET- Effective Privacy based Distributed Storage Structure
IRJET- Effective Privacy based Distributed Storage Structure
IRJET Journal
 
Addressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud ComputingAddressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud Computing
Editor IJCATR
 
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud ComputingIRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET Journal
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Editor IJMTER
 
Advanced resource allocation and service level monitoring for container orche...
Advanced resource allocation and service level monitoring for container orche...Advanced resource allocation and service level monitoring for container orche...
Advanced resource allocation and service level monitoring for container orche...
Conference Papers
 
Smart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentSmart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud Environment
IRJET Journal
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
idescitation
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learning
Manimaran A
 
50120140503020
5012014050302050120140503020
50120140503020
IAEME Publication
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
ijccsa
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
 
Toward Cloud Computing: Security and Performance
Toward Cloud Computing: Security and PerformanceToward Cloud Computing: Security and Performance
Toward Cloud Computing: Security and Performance
ijccsa
 
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual ProtectionIRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual Protection
IRJET Journal
 
Overview of cloud computing architecture service
Overview of cloud computing architecture serviceOverview of cloud computing architecture service
Overview of cloud computing architecture service
eSAT Publishing House
 
Overview of cloud computing architecture
Overview of cloud computing architectureOverview of cloud computing architecture
Overview of cloud computing architecture
eSAT Journals
 
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud Computing
IJMER
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET Journal
 
Authenticated and unrestricted auditing of big data space on cloud through v...
Authenticated and unrestricted auditing of big data space on  cloud through v...Authenticated and unrestricted auditing of big data space on  cloud through v...
Authenticated and unrestricted auditing of big data space on cloud through v...
IJMER
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET Journal
 
IRJET- Effective Privacy based Distributed Storage Structure
IRJET- Effective Privacy based Distributed Storage StructureIRJET- Effective Privacy based Distributed Storage Structure
IRJET- Effective Privacy based Distributed Storage Structure
IRJET Journal
 
Addressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud ComputingAddressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud Computing
Editor IJCATR
 
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud ComputingIRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET Journal
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Editor IJMTER
 
Advanced resource allocation and service level monitoring for container orche...
Advanced resource allocation and service level monitoring for container orche...Advanced resource allocation and service level monitoring for container orche...
Advanced resource allocation and service level monitoring for container orche...
Conference Papers
 
Smart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentSmart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud Environment
IRJET Journal
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
idescitation
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learning
Manimaran A
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
ijccsa
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
 
Toward Cloud Computing: Security and Performance
Toward Cloud Computing: Security and PerformanceToward Cloud Computing: Security and Performance
Toward Cloud Computing: Security and Performance
ijccsa
 
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual ProtectionIRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual Protection
IRJET Journal
 

Similar to Transforming the Data into Virtual Set Up Segmented usage and Adoption (20)

IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET Journal
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
ijtsrd
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
IRJET Journal
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET Journal
 
A secure cloud service deployment framework for DevOps
A secure cloud service deployment framework for DevOpsA secure cloud service deployment framework for DevOps
A secure cloud service deployment framework for DevOps
nooriasukmaningtyas
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET Journal
 
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
IRJET Journal
 
Virtual Machine Migration and Allocation in Cloud Computing: A Review
Virtual Machine Migration and Allocation in Cloud Computing: A ReviewVirtual Machine Migration and Allocation in Cloud Computing: A Review
Virtual Machine Migration and Allocation in Cloud Computing: A Review
ijtsrd
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloud
ssuser84183f
 
IRJET- An Overview on Mobile Cloud Computing
IRJET-  	  An Overview on Mobile Cloud ComputingIRJET-  	  An Overview on Mobile Cloud Computing
IRJET- An Overview on Mobile Cloud Computing
IRJET Journal
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
ijcsit
 
Maintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous AuditingMaintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous Auditing
ijtsrd
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
IJCERT JOURNAL
 
Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSEffective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaS
IRJET Journal
 
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
IIRindia
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
IRJET Journal
 
A survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computingA survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computing
IAEME Publication
 
[IJCT-V3I3P2] Authors: Prithvipal Singh, Sunny Sharma, Amritpal Singh, Karand...
[IJCT-V3I3P2] Authors: Prithvipal Singh, Sunny Sharma, Amritpal Singh, Karand...[IJCT-V3I3P2] Authors: Prithvipal Singh, Sunny Sharma, Amritpal Singh, Karand...
[IJCT-V3I3P2] Authors: Prithvipal Singh, Sunny Sharma, Amritpal Singh, Karand...
IJET - International Journal of Engineering and Techniques
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET Journal
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
ijtsrd
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
IRJET Journal
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET Journal
 
A secure cloud service deployment framework for DevOps
A secure cloud service deployment framework for DevOpsA secure cloud service deployment framework for DevOps
A secure cloud service deployment framework for DevOps
nooriasukmaningtyas
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET Journal
 
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
IRJET Journal
 
Virtual Machine Migration and Allocation in Cloud Computing: A Review
Virtual Machine Migration and Allocation in Cloud Computing: A ReviewVirtual Machine Migration and Allocation in Cloud Computing: A Review
Virtual Machine Migration and Allocation in Cloud Computing: A Review
ijtsrd
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloud
ssuser84183f
 
IRJET- An Overview on Mobile Cloud Computing
IRJET-  	  An Overview on Mobile Cloud ComputingIRJET-  	  An Overview on Mobile Cloud Computing
IRJET- An Overview on Mobile Cloud Computing
IRJET Journal
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
ijcsit
 
Maintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous AuditingMaintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous Auditing
ijtsrd
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
IJCERT JOURNAL
 
Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSEffective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaS
IRJET Journal
 
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
IIRindia
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
IRJET Journal
 
A survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computingA survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computing
IAEME Publication
 
Ad

More from ijtsrd (20)

A Study of School Dropout in Rural Districts of Darjeeling and Its Causes
A Study of School Dropout in Rural Districts of Darjeeling and Its CausesA Study of School Dropout in Rural Districts of Darjeeling and Its Causes
A Study of School Dropout in Rural Districts of Darjeeling and Its Causes
ijtsrd
 
Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...
Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...
Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...
ijtsrd
 
Pre extension Demonstration and Evaluation of Potato Technologies in Selected...
Pre extension Demonstration and Evaluation of Potato Technologies in Selected...Pre extension Demonstration and Evaluation of Potato Technologies in Selected...
Pre extension Demonstration and Evaluation of Potato Technologies in Selected...
ijtsrd
 
Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...
Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...
Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...
ijtsrd
 
Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...
Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...
Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...
ijtsrd
 
Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...
Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...
Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...
ijtsrd
 
Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...
Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...
Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...
ijtsrd
 
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
ijtsrd
 
Manpower Training and Employee Performance in Mellienium Ltdawka, Anambra State
Manpower Training and Employee Performance in Mellienium Ltdawka, Anambra StateManpower Training and Employee Performance in Mellienium Ltdawka, Anambra State
Manpower Training and Employee Performance in Mellienium Ltdawka, Anambra State
ijtsrd
 
A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...
A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...
A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...
ijtsrd
 
Automatic Accident Detection and Emergency Alert System using IoT
Automatic Accident Detection and Emergency Alert System using IoTAutomatic Accident Detection and Emergency Alert System using IoT
Automatic Accident Detection and Emergency Alert System using IoT
ijtsrd
 
Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...
Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...
Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...
ijtsrd
 
The Role of Media in Tribal Health and Educational Progress of Odisha
The Role of Media in Tribal Health and Educational Progress of OdishaThe Role of Media in Tribal Health and Educational Progress of Odisha
The Role of Media in Tribal Health and Educational Progress of Odisha
ijtsrd
 
Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...
Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...
Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...
ijtsrd
 
A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...
A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...
A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...
ijtsrd
 
Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...
Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...
Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...
ijtsrd
 
Performance of Grid Connected Solar PV Power Plant at Clear Sky Day
Performance of Grid Connected Solar PV Power Plant at Clear Sky DayPerformance of Grid Connected Solar PV Power Plant at Clear Sky Day
Performance of Grid Connected Solar PV Power Plant at Clear Sky Day
ijtsrd
 
Vitiligo Treated Homoeopathically A Case Report
Vitiligo Treated Homoeopathically A Case ReportVitiligo Treated Homoeopathically A Case Report
Vitiligo Treated Homoeopathically A Case Report
ijtsrd
 
Vitiligo Treated Homoeopathically A Case Report
Vitiligo Treated Homoeopathically A Case ReportVitiligo Treated Homoeopathically A Case Report
Vitiligo Treated Homoeopathically A Case Report
ijtsrd
 
Uterine Fibroids Homoeopathic Perspectives
Uterine Fibroids Homoeopathic PerspectivesUterine Fibroids Homoeopathic Perspectives
Uterine Fibroids Homoeopathic Perspectives
ijtsrd
 
A Study of School Dropout in Rural Districts of Darjeeling and Its Causes
A Study of School Dropout in Rural Districts of Darjeeling and Its CausesA Study of School Dropout in Rural Districts of Darjeeling and Its Causes
A Study of School Dropout in Rural Districts of Darjeeling and Its Causes
ijtsrd
 
Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...
Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...
Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...
ijtsrd
 
Pre extension Demonstration and Evaluation of Potato Technologies in Selected...
Pre extension Demonstration and Evaluation of Potato Technologies in Selected...Pre extension Demonstration and Evaluation of Potato Technologies in Selected...
Pre extension Demonstration and Evaluation of Potato Technologies in Selected...
ijtsrd
 
Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...
Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...
Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...
ijtsrd
 
Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...
Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...
Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...
ijtsrd
 
Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...
Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...
Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...
ijtsrd
 
Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...
Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...
Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...
ijtsrd
 
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
ijtsrd
 
Manpower Training and Employee Performance in Mellienium Ltdawka, Anambra State
Manpower Training and Employee Performance in Mellienium Ltdawka, Anambra StateManpower Training and Employee Performance in Mellienium Ltdawka, Anambra State
Manpower Training and Employee Performance in Mellienium Ltdawka, Anambra State
ijtsrd
 
A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...
A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...
A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...
ijtsrd
 
Automatic Accident Detection and Emergency Alert System using IoT
Automatic Accident Detection and Emergency Alert System using IoTAutomatic Accident Detection and Emergency Alert System using IoT
Automatic Accident Detection and Emergency Alert System using IoT
ijtsrd
 
Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...
Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...
Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...
ijtsrd
 
The Role of Media in Tribal Health and Educational Progress of Odisha
The Role of Media in Tribal Health and Educational Progress of OdishaThe Role of Media in Tribal Health and Educational Progress of Odisha
The Role of Media in Tribal Health and Educational Progress of Odisha
ijtsrd
 
Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...
Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...
Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...
ijtsrd
 
A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...
A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...
A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...
ijtsrd
 
Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...
Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...
Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...
ijtsrd
 
Performance of Grid Connected Solar PV Power Plant at Clear Sky Day
Performance of Grid Connected Solar PV Power Plant at Clear Sky DayPerformance of Grid Connected Solar PV Power Plant at Clear Sky Day
Performance of Grid Connected Solar PV Power Plant at Clear Sky Day
ijtsrd
 
Vitiligo Treated Homoeopathically A Case Report
Vitiligo Treated Homoeopathically A Case ReportVitiligo Treated Homoeopathically A Case Report
Vitiligo Treated Homoeopathically A Case Report
ijtsrd
 
Vitiligo Treated Homoeopathically A Case Report
Vitiligo Treated Homoeopathically A Case ReportVitiligo Treated Homoeopathically A Case Report
Vitiligo Treated Homoeopathically A Case Report
ijtsrd
 
Uterine Fibroids Homoeopathic Perspectives
Uterine Fibroids Homoeopathic PerspectivesUterine Fibroids Homoeopathic Perspectives
Uterine Fibroids Homoeopathic Perspectives
ijtsrd
 
Ad

Recently uploaded (20)

Biophysics Chapter 3 Methods of Studying Macromolecules.pdf
Biophysics Chapter 3 Methods of Studying Macromolecules.pdfBiophysics Chapter 3 Methods of Studying Macromolecules.pdf
Biophysics Chapter 3 Methods of Studying Macromolecules.pdf
PKLI-Institute of Nursing and Allied Health Sciences Lahore , Pakistan.
 
Cultivation Practice of Garlic in Nepal.pptx
Cultivation Practice of Garlic in Nepal.pptxCultivation Practice of Garlic in Nepal.pptx
Cultivation Practice of Garlic in Nepal.pptx
UmeshTimilsina1
 
Grade 2 - Mathematics - Printable Worksheet
Grade 2 - Mathematics - Printable WorksheetGrade 2 - Mathematics - Printable Worksheet
Grade 2 - Mathematics - Printable Worksheet
Sritoma Majumder
 
Ajanta Paintings: Study as a Source of History
Ajanta Paintings: Study as a Source of HistoryAjanta Paintings: Study as a Source of History
Ajanta Paintings: Study as a Source of History
Virag Sontakke
 
Myopathies (muscle disorders) for undergraduate
Myopathies (muscle disorders) for undergraduateMyopathies (muscle disorders) for undergraduate
Myopathies (muscle disorders) for undergraduate
Mohamed Rizk Khodair
 
Rococo versus Neoclassicism. The artistic styles of the 18th century
Rococo versus Neoclassicism. The artistic styles of the 18th centuryRococo versus Neoclassicism. The artistic styles of the 18th century
Rococo versus Neoclassicism. The artistic styles of the 18th century
Gema
 
YSPH VMOC Special Report - Measles Outbreak Southwest US 5-3-2025.pptx
YSPH VMOC Special Report - Measles Outbreak  Southwest US 5-3-2025.pptxYSPH VMOC Special Report - Measles Outbreak  Southwest US 5-3-2025.pptx
YSPH VMOC Special Report - Measles Outbreak Southwest US 5-3-2025.pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 
Ancient Stone Sculptures of India: As a Source of Indian History
Ancient Stone Sculptures of India: As a Source of Indian HistoryAncient Stone Sculptures of India: As a Source of Indian History
Ancient Stone Sculptures of India: As a Source of Indian History
Virag Sontakke
 
The History of Kashmir Karkota Dynasty NEP.pptx
The History of Kashmir Karkota Dynasty NEP.pptxThe History of Kashmir Karkota Dynasty NEP.pptx
The History of Kashmir Karkota Dynasty NEP.pptx
Arya Mahila P. G. College, Banaras Hindu University, Varanasi, India.
 
Drugs in Anaesthesia and Intensive Care,.pdf
Drugs in Anaesthesia and Intensive Care,.pdfDrugs in Anaesthesia and Intensive Care,.pdf
Drugs in Anaesthesia and Intensive Care,.pdf
crewot855
 
How to Create Kanban View in Odoo 18 - Odoo Slides
How to Create Kanban View in Odoo 18 - Odoo SlidesHow to Create Kanban View in Odoo 18 - Odoo Slides
How to Create Kanban View in Odoo 18 - Odoo Slides
Celine George
 
CNS infections (encephalitis, meningitis & Brain abscess
CNS infections (encephalitis, meningitis & Brain abscessCNS infections (encephalitis, meningitis & Brain abscess
CNS infections (encephalitis, meningitis & Brain abscess
Mohamed Rizk Khodair
 
Junction Field Effect Transistors (JFET)
Junction Field Effect Transistors (JFET)Junction Field Effect Transistors (JFET)
Junction Field Effect Transistors (JFET)
GS Virdi
 
Cultivation Practice of Onion in Nepal.pptx
Cultivation Practice of Onion in Nepal.pptxCultivation Practice of Onion in Nepal.pptx
Cultivation Practice of Onion in Nepal.pptx
UmeshTimilsina1
 
APGAR SCORE BY sweety Tamanna Mahapatra MSc Pediatric
APGAR SCORE  BY sweety Tamanna Mahapatra MSc PediatricAPGAR SCORE  BY sweety Tamanna Mahapatra MSc Pediatric
APGAR SCORE BY sweety Tamanna Mahapatra MSc Pediatric
SweetytamannaMohapat
 
Herbs Used in Cosmetic Formulations .pptx
Herbs Used in Cosmetic Formulations .pptxHerbs Used in Cosmetic Formulations .pptx
Herbs Used in Cosmetic Formulations .pptx
RAJU THENGE
 
03#UNTAGGED. Generosity in architecture.
03#UNTAGGED. Generosity in architecture.03#UNTAGGED. Generosity in architecture.
03#UNTAGGED. Generosity in architecture.
MCH
 
Lecture 4 INSECT CUTICLE and moulting.pptx
Lecture 4 INSECT CUTICLE and moulting.pptxLecture 4 INSECT CUTICLE and moulting.pptx
Lecture 4 INSECT CUTICLE and moulting.pptx
Arshad Shaikh
 
apa-style-referencing-visual-guide-2025.pdf
apa-style-referencing-visual-guide-2025.pdfapa-style-referencing-visual-guide-2025.pdf
apa-style-referencing-visual-guide-2025.pdf
Ishika Ghosh
 
All About the 990 Unlocking Its Mysteries and Its Power.pdf
All About the 990 Unlocking Its Mysteries and Its Power.pdfAll About the 990 Unlocking Its Mysteries and Its Power.pdf
All About the 990 Unlocking Its Mysteries and Its Power.pdf
TechSoup
 
Cultivation Practice of Garlic in Nepal.pptx
Cultivation Practice of Garlic in Nepal.pptxCultivation Practice of Garlic in Nepal.pptx
Cultivation Practice of Garlic in Nepal.pptx
UmeshTimilsina1
 
Grade 2 - Mathematics - Printable Worksheet
Grade 2 - Mathematics - Printable WorksheetGrade 2 - Mathematics - Printable Worksheet
Grade 2 - Mathematics - Printable Worksheet
Sritoma Majumder
 
Ajanta Paintings: Study as a Source of History
Ajanta Paintings: Study as a Source of HistoryAjanta Paintings: Study as a Source of History
Ajanta Paintings: Study as a Source of History
Virag Sontakke
 
Myopathies (muscle disorders) for undergraduate
Myopathies (muscle disorders) for undergraduateMyopathies (muscle disorders) for undergraduate
Myopathies (muscle disorders) for undergraduate
Mohamed Rizk Khodair
 
Rococo versus Neoclassicism. The artistic styles of the 18th century
Rococo versus Neoclassicism. The artistic styles of the 18th centuryRococo versus Neoclassicism. The artistic styles of the 18th century
Rococo versus Neoclassicism. The artistic styles of the 18th century
Gema
 
Ancient Stone Sculptures of India: As a Source of Indian History
Ancient Stone Sculptures of India: As a Source of Indian HistoryAncient Stone Sculptures of India: As a Source of Indian History
Ancient Stone Sculptures of India: As a Source of Indian History
Virag Sontakke
 
Drugs in Anaesthesia and Intensive Care,.pdf
Drugs in Anaesthesia and Intensive Care,.pdfDrugs in Anaesthesia and Intensive Care,.pdf
Drugs in Anaesthesia and Intensive Care,.pdf
crewot855
 
How to Create Kanban View in Odoo 18 - Odoo Slides
How to Create Kanban View in Odoo 18 - Odoo SlidesHow to Create Kanban View in Odoo 18 - Odoo Slides
How to Create Kanban View in Odoo 18 - Odoo Slides
Celine George
 
CNS infections (encephalitis, meningitis & Brain abscess
CNS infections (encephalitis, meningitis & Brain abscessCNS infections (encephalitis, meningitis & Brain abscess
CNS infections (encephalitis, meningitis & Brain abscess
Mohamed Rizk Khodair
 
Junction Field Effect Transistors (JFET)
Junction Field Effect Transistors (JFET)Junction Field Effect Transistors (JFET)
Junction Field Effect Transistors (JFET)
GS Virdi
 
Cultivation Practice of Onion in Nepal.pptx
Cultivation Practice of Onion in Nepal.pptxCultivation Practice of Onion in Nepal.pptx
Cultivation Practice of Onion in Nepal.pptx
UmeshTimilsina1
 
APGAR SCORE BY sweety Tamanna Mahapatra MSc Pediatric
APGAR SCORE  BY sweety Tamanna Mahapatra MSc PediatricAPGAR SCORE  BY sweety Tamanna Mahapatra MSc Pediatric
APGAR SCORE BY sweety Tamanna Mahapatra MSc Pediatric
SweetytamannaMohapat
 
Herbs Used in Cosmetic Formulations .pptx
Herbs Used in Cosmetic Formulations .pptxHerbs Used in Cosmetic Formulations .pptx
Herbs Used in Cosmetic Formulations .pptx
RAJU THENGE
 
03#UNTAGGED. Generosity in architecture.
03#UNTAGGED. Generosity in architecture.03#UNTAGGED. Generosity in architecture.
03#UNTAGGED. Generosity in architecture.
MCH
 
Lecture 4 INSECT CUTICLE and moulting.pptx
Lecture 4 INSECT CUTICLE and moulting.pptxLecture 4 INSECT CUTICLE and moulting.pptx
Lecture 4 INSECT CUTICLE and moulting.pptx
Arshad Shaikh
 
apa-style-referencing-visual-guide-2025.pdf
apa-style-referencing-visual-guide-2025.pdfapa-style-referencing-visual-guide-2025.pdf
apa-style-referencing-visual-guide-2025.pdf
Ishika Ghosh
 
All About the 990 Unlocking Its Mysteries and Its Power.pdf
All About the 990 Unlocking Its Mysteries and Its Power.pdfAll About the 990 Unlocking Its Mysteries and Its Power.pdf
All About the 990 Unlocking Its Mysteries and Its Power.pdf
TechSoup
 

Transforming the Data into Virtual Set Up Segmented usage and Adoption

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume: 3 | Issue: 3 | Mar-Apr 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 - 6470 @ IJTSRD | Unique Paper ID – IJTSRD23094 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 856 Transforming the Data into Virtual Set-Up Segmented usage and Adoption Dr. R. Poorvadevi Assistant Professor, CSE Department, SCSVMV University, Kanchipuram, Tamil Nadu, India How to cite this paper: Dr. R. Poorvadevi "TransformingtheDatainto Virtual Set-Up Segmented usage and Adoption" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-3 | Issue-3 , April 2019, pp.856-858, URL: https://www.ijtsrd.c om/papers/ijtsrd23 094.pdf Copyright © 2019 by author(s) and International Journal of Trend in Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the CreativeCommons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/ by/4.0) ABSTRACT In digitalized environment, heterogeneous users are host and deploy their applications as a digital transformation. As the growing of dynamic business requirements, the operational values of service level agility, scaling and availability of resources are the more focusing components. However, enterprises are needed to deliver the data with atmost desired security value to its genuineness users. All the client level processes are initiated by verifying the strong security level access parameters. So, it is important to process the data migration with the adopted cloud vendors. Lots of securitybreachesarecausing the data level protection in the service access environment. The proposed work will implement the secured transformation user’s data, applications, and resources to the desired virtual set-up in order to strengthen the customer’s application. The approach will be used to finding the service adoption by verifying the level of service guaranty with the cloud vendor adoption. KEYWORDS: Data migration, Cloud adoption, cloud vendor, data segmentation, cloud service provider, Virtual set-up, cloud client, Security breaches. 1. Introduction Cloud framework has the challenges for fundamentals of security which are isolation and segmentation. Moving applications and data from fully self-controlled to third party-controlled realms poses a significant cyber security concern to most enterprises. IT and security teams rigorously assess applications on a case by case basis before they are moved to the cloud – especially applications which create, process, and store sensitive data. As a best practice for cloud adoption, the less criticalapplicationsaremoved to the cloud first, with the assumption that this reduces the security risk and allows gaining experience..Attackerstoday use sophisticated techniques, not only to steal data, but also to compromise the systems to create bot networks. This eventually robs the enterprise with excessive cloud billing and potentially opens the door to access more sensitive applications which are on-premise. These are some of the reasons why cloud adoption is a slow and carefulprocessfor most enterprises. 2. Literature Study An author Paulo Rupino da Cunha, et.al, “Avoiding Lock-In: Timely Reconfiguration of a virtual cloud Platformon Topof Multiple PaaS and IaaS Providers”. This paper has mainly focused on virtual cloud platform creation for multiple level of PaaS and IaaS service provider. All the lock-incontrols are reconfigured with cloud underlying architecture. [1] Zhengping Liang et.al, “Security of virtual working on cloud computing platform”. This paper has implemented the security metrics for the various cloud user applications. Determined the virtual set-up process for all the cloud service provider data sources. [2] Pongsakorn U-chupala et. al, “An implementation of a multi- site virtual cluster cloud”. This paper proposed a novel approach of multi site user application transformed to the virtual cluster groups by specifying the access level policies, data protection in the service platform.[3] So, from the analysis of background work all the security level implementations were considered and processed into the different cloud adoption. There arenospecificstandards, access policies are formed for the data migration. 3. Proposed Work Accelerating the cloudapplicationtothemicrosegmentation will process the application, data level functions the digital transformation level to mitigate the security policies with the compromising security parametric values. The various client service specific applications were examinedunderthe machine –critical applications and finding the enterprises to secure the entire client level resources tobesegmented with the cloud user adoption level. External threats also to be IJTSRD23094
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID - IJTSRD23094 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 857 notified with the security perimeter control to process and regulate the traffic between the access policies. Internal networks, technologies are combined with the data segmentation policy level to produce the application migration and content specific process over the transformation levels. The following are the needs for transforming data to the virtual setup for the cloud user and enterprise applications which is listed below: Modernize Current IT asset base Prepare for future needs Lower infrastructure costs Increase Business agility Disaster Recovery Security The major concern for transformation of data to the virtual setup is data gravity. The cloud infrastructure will explicitly specify the data abstraction for the user applications. Integration of business segments to the varioususergroups. It also finds the customized time factor for transforming of any client level resources to the virtual environment. Fig: 1 proposed system architecture An above diagram will (fig1) depicts the functional process of iterating the applications and client’s data in the virtualized environment. All the genericprocesswillanalyze the micro level segmentation task in thecloud infrastructure platform to specify the level of segmented data usage. 4. Implementation Work Customizing the data integration among the cloud vendors will specify to locate the users application in the secured platform by maintaining the data management policies and application mobility and also improving the governance. The main issue is that every application complicates data management by introducing elements of application logic into the data management tier, and each one is indifferentto the next data use case. Business processes use data in isolation and then output their own formats, leaving integration for the next process. Therefore, application design, data architecture, and business processes must all respond to each other, but often one of these groups is unable or unwilling to change. This forces application administrators to sidestep ideal and simple workflows, resulting in suboptimal designs. And, although the workaround may have been necessary at the time, this technical debt must eventually be addressed during data migration or integration projects Fig: 2 Process of Data migration in Virtual set-up All the generic process is built on the application environment and identification of client level security parameters are evaluated with the virtual key ID values. However, entire transaction of client’s information is also migrated with the specific cloud vendor platform. The following are the various strategicprocessesareverified and demonstrated in the virtualized environment. The key logger’s data has been identified by encrypting the correct key values in the client access platform. The following table shows the sample identified results for the application transformation to the virtual setup which is listed below: Service Process ID Migrated Environment Cloud adoption status Process efficiency (%) ID –709 AWS Processd 89.23 ID - 15.267 GAE optimizd 94.3 ID - 53.083 Sales force verified 97.16 ID –67.1 Microsoft Azure cloud processd 99.03 ID –48.2 EC2 Processd 99.42 Table: 1 depicting the migration process outcome The above table process the significant role of application migration to the requested user access zone. All the generic processes are evaluated under the desired service environment. This table show that, how the migration has taken place for the various service access platforms. 5. Experimental Results The user application process isdemonstratedfor the various migration policies to evaluate the service migrationprocess. Segmented data has been adapted to the cloud vendor location and process the migration level access constraints along the service environment.Toenabletheserviceprocess for the various cloud user applications virtualized environment credentials are investigated with the specific user level access information. Fig: 3 Process of Transformation of user application to the virtual environment
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID - IJTSRD23094 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 858 6. Conclusion From the migration perspective all the user access level constraints are verified for the applications transformation to the virtualized environment. All the security components are iterated with the specific functional parameters for segmenting the data into the concern and schematic cloud adoption mechanism. References: [1] Paulo Melo ; Catarina FerreiradaSilva, :AvoidingLock- In: Timely Reconfiguration of a virtual cloud Platform on Top of Multiple PaaS and IaaS Providers”, International conference on Cloud Computing, Year: 2013, Pages: 970 – 971 [2] ZhengpingLiang ; SongsongJia ; JianyongChen ; Pengfu Chen, “Security of virtual working on cloud computing platform”,2012 IEEE Asia Pacific cloud Computing Congress (APCloudCC),Year: 2012, Pages: 72 – 75 [3] Pongsakorn U-chupala ; Putchong Uthayopas ; Kohei Ichikawa ; Susumu Date ; Hirotake Abe, “An implementation of a multi-site virtual cluster cloud ”, The 2013 10th International Joint Conference on Computer Science and Software Engineering (JCSSE), Year: 2013, Pages: 155 - 159 [4] Qi Zhang ; Ling Liu ; Calton Pu ; Qiwei Dou ; Liren Wu ; Wei Zhou, “A Comparative Study of Containers and virtual Machines in Big Data Environment”,2018 IEEE 11th International Conference on Cloud Computing (CLOUD), Year: 2018, Pages: 178 – 185 [5] Subhadra Bose Shaw ; Jay Prakash Kumar ; AnilKumar Singh, “Energy-performance trade-off through restricted virtual machine consolidation in cloud data center”, 2017 International Conference on Intelligent Computing and Control (I2C2), Year:2017, Pages: 1 – 6 [6] Fanqiang ; Xiaoxia Xu ; Libo cui, “The research about modeling technology of irregular virtual reality scene based on point cloud data”, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), Year: 2010 , Volume: 6 Pages: V6-538 - V6-541 [7] D. Maria Manuel Vianny ; M. Aramudhan ; G. Ravikumar, “Effective binary cuckoo search optimization based cloud brokering mechanism on cloud”, 2017 International Conference on IoT and Application (ICIOT), Year: 2017, Pages: 1 - 8