Frequency: Quarterly E- ISSN: 2278-6317 P- ISSN: Abstracted/ Indexed in: Ulrich's International Periodical Directory, Google Scholar, SCIRUS, Genamics JournalSeek, EBSCO Information Services
Quarterly published in print and online "Inventi Rapid: Cloud Computing" publishes high quality unpublished as well as high impact pre-published research and reviews catering to the needs of researchers and professionals. The journal covers all the advances in the growing field of cloud computing. Articles pertaining to following areas are particularly welcome: cloud architectures, infrastructures and workflows; cloud storage and data distribution; cloud messaging and database systems; virtual containers and portable applications; cloud security, trust and governance; migrating between grids and clouds; service oriented cloud architectures; evaluation of private, public and hybrid clouds and cloud bursting; cloud ecosystems etc.
Today’s organizations are dealing with tremendous amount of data. Since cloud provides cost effective solution, organizations prefer cloud storage. But with cloud storage data security issues arises. Within an organization, there are many data users with different credentials. The secure sharing of data among such users is needed to be done carefully. In this paper named –“A review on: Secure Data Sharing in Cloud (SeDaSc)” we proposed one approach in which data user will able to access only that data for which he/she has given a permission. This also presents possible insider threat of third party in previous approach and its solution. For this we used the concept of two layer encryption where lower layer encryption is performed by data owner and upper layer encryption is performed by Third Party. The third party is a server located in between cloud customer (say organization) and cloud. Here by retaining control over some operations at data owner we tried to achieve more data confidentiality. Users are registered with an owner with unique id and password. This approach ensures 1) data confidentiality; 2) access control; 3) data sharing (forwarding) without using compute-intensive reencryption; 4) insider threat security; and 5) forward and backward access control....
Cloud Computing is an emerging technology that has to stir up the concern of the whole world. Cloud Computing is a relatively new way of referring to the use of shared computing resources. Some difficulty part in cloud computing is to deploy in the real environment. It is very hard to know the exact cost and its requirement until or unless we buy the service. Some scenarios are analyzed here by using simulator. By using this simulation, we can easily understand the real environment of the cloud computing. Later on by getting the successful result we can start deploying an application in the cloud computing environment. Five different scenarios are analyzed here and find out the overall performance of it i.e. the cost, response time etc. and as well as the failure detection in the components of IaaS with the use of simulation....
Cloud computing is flexible, on-demand and low-cost uses of computing resources so that rapid developments occurring in cloud computing and services. There has been a growing trend to use the cloud for large-scale data storage. This has raised the important security issue of how to control and prevent unauthorized access to data stored in the cloud. New decentralized access control scheme was proposed for secure data storage in cloud which uses attribute based encryption. In the proposed scheme the authenticity of users has anonymously done by trustee before the data stores on clouds. Also proposed scheme has provided features that only authorized users are able to decrypt stored data. The cloud in proposed scheme used only to store information which reduce computation and storage overhead than previous scheme....
Loading....