Refine your search
Collections
Co-Authors
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Jain, Aaditya
- Advance Computing Paradigm with the Perspective of Cloud Computing-An Analytical
Abstract Views :192 |
PDF Views:3
Authors
Affiliations
1 Department of Computer Science & Engg., R. N. Modi Engineering College, Rajasthan Technical University, Kota, Rajasthan, IN
1 Department of Computer Science & Engg., R. N. Modi Engineering College, Rajasthan Technical University, Kota, Rajasthan, IN
Source
International Journal of Advanced Networking and Applications, Vol 8, No 6 (2017), Pagination: 3257-3265Abstract
Internet has been a driving force towards the various technologies that have been developed. Arguably, one of the most discussed among all of these is Cloud Computing. Cloud computing is seen as a trend in the present day scenario with almost all the organizations trying to make an entry into it. It is a promising and emerging technology for the next generation of IT applications. This paper presents the evolution, history, and definition of cloud computing and also presents a comprehensive analysis of the cloud computing by explaining its services and deployment models, and identifying various characteristics of concern.Keywords
Cloud Computing, Characteristics, Cloud Computing Service Models, Cloud Computing Deployment Models.References
- Aaditya Jain and Dr. Bala Buksh, “Overview of Cloud Computing with Security Issues, Challenges and Countermeasures”, International Conference on Recent Research Development in Science, Engineering and Management (ICRRDSEM), Pune, ISBN:978-81-931039-0-6, May 2016.
- Akande, A.O., N.A. April, and J.-P. Van Belle, “Management Issues with Cloud Computing”, in Proceedings of the Second International Conference on Innovative Computing and Cloud Computing. 2013. ACM.
- Sharma, R. and R.K. Trivedi, “Literature review: Cloud Computing–Security Issues, Solution and Technologies”, International Journal of Engineering Research ISSN, 2013: p. 2319-6890.
- Khan, A.W., S.U. Khan, M. Ilyas, and M.I. Azeem, “A literature survey on data privacy/protection issues and challenges in cloud computing”, IOSR Journal of Computer Engineering (IOSRJCE) ISSN, 2012: p. 2278-0661.
- Sriram, I. and A. Khajeh-Hosseini, “Research agenda in cloud technologies” arXiv preprint arXiv:1001.3259, 2010.
- Mell, P. and T. Grance, “The NIST definition of cloud computing”, 2011.
- Islam, S. and J.-C. Grégoire, “Giving users an edge: A flexible Cloud model and its application for multimedia”, Future Generation Computer Systems, 2012. 28(6): p. 823-832.
- Böhm, M., S. Leimeister, C. Riedl, and H. Krcmar, “Cloud computing and computing evolution”, B. Smith ,“An approach to graphs of linear forms, 2010.
- Stavinoha, K.E., What is Cloud Computing and Why Do We Need It. 2010, Citeseer.
- Rai, R., G. Sahoo, and S. Mehfuz, “Securing software as a service model of cloud computing: Issues and solutions”, arXiv preprint arXiv:1309.2426, 2013.
- Khorshed, M.T., A.S. Ali, and S.A. Wasimi, “A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing”, Future Generation computer systems, 2012. 28(6): p. 833-851.
- Oliveira, T., M. Thomas, and M. Espadanal, “Assessing the determinants of cloud computing adoption: An analysis of the manufacturing and services sectors”, Information & Management, 2014. 51(5): p. 497-510.
- Dillon, T., C. Wu, and E. Chang, “Cloud computing: issues and challenges”, in 24th IEEE international conference on advanced information networking and applications. 2010.
- Srinivas, J., K.V.S. Reddy, and A.M. Qyser, “Cloud computing basics”, International journal of advanced research in computer and communication engineering, 2012. 1(5).
- Thakur, N., D. Bisen, V. Rohit, and N. Gupta,“Review on Cloud Computing: Issues, Services and Models”, International Journal of Computer Applications, 2014. 91(9).
- Ashrafa, I., “An Overview of Service Models of Cloud Computing”, Int. J. of Multidisciplinary and Current research, 2014.
- Rao, C.C., M. Leelarani, and Y.R. Kumar, “Cloud: Computing Services and Deployment Models”, International Journal of Engineering and Computer Science, 2013. 2(12).
- Khurana, S. and A.G. Verma, “Comparison of Cloud Computing Service Models: SaaS, PaaS, IaaS”,International Journal of Electronics & Communication Technology IJECT, 2013.
- Fernandes, D.A., L.F. Soares, J.V. Gomes, M.M. Freire, and P.R. Inácio, “Security issues in cloud environments: a survey”. International Journal of Information Security, 2014. 13(2): p. 113-170.
- Salleh, S.M., S.Y. Teoh, and C. Chan. “Cloud Enterprise Systems: A Review Of Literature And Its Adoption”, in PACIS. 2012.
- Tehrani, S.R. and F. Shirazi, “Factors influencing the adoption of cloud computing by small and medium size enterprises (SMEs)”in International Conference on Human Interface and the Management of Information. 2014. Springer.
- Chauhan, V.K., K. Bansal, and P. Alappanavar, “Exposing cloud computing as a failure”, International journal of engineering science and technology, 2012. 4(4).
- Kim, W., “Cloud Computing: Today and Tomorrow”, Journal of object technology, 2009. 8(1): p. 65-72.
- Parsi, K. and M. Laharika, “A Comparative Study of Different Deployment Models in a Cloud”, International Journal of Advanced Research in Computer Science and Software Engineering, 2013. 3(5): p. 512-515.
- Grossman, R.L., “The case for cloud computing”,IT professional, 2009. 11(2): p. 23-27.
- Sujay, R., “Hybrid cloud: A new era”,International Journal of Computer Science and Technology (IJCST), 2011. 2(2): p. 323-326.
- Badger, L., T. Grance, R. Patt-Corner, and J. Voas, “Draft cloud computing synopsis and recommendations”, NIST special publication, 2011. 800: pp. 146.
- Sadashiv, N. and S.D. Kumar, “Cluster, grid and cloud computing: A detailed comparison. in Computer Science & Education (ICCSE)”, 6th International Conference on. 2011. IEEE.
- Muhammad, A.R., “Towards cloud adoption in Africa: The case of Nigeria”,International Journal of Scientific & Engineering Research, 6 (1), 2015: p. 657-664.
- Hashemi, S.M. and A.K. Bardsiri, “Cloud computing Vs. grid computing”,ARPN Journal of Systems and Software, 2012. 2(5): p. 188-194.
- Voorsluys, W., J. Broberg, and R. Buyya, “Introduction to cloud computing”, Cloud computing: Principles and paradigms, 2011: p. 1-44.
- Boon, M. What is autonomic computing? 2011.
- Secure Modern Healthcare System Based on Internet of Things and Secret Sharing of IoT Healthcare Data
Abstract Views :183 |
PDF Views:3
Authors
Affiliations
1 Department of Computer Science & Engg., R. N. Modi Engineering College, Rajasthan Technical University, Kota, Rajasthan, IN
1 Department of Computer Science & Engg., R. N. Modi Engineering College, Rajasthan Technical University, Kota, Rajasthan, IN
Source
International Journal of Advanced Networking and Applications, Vol 8, No 6 (2017), Pagination: 3283-3289Abstract
The Internet of Things (IoT), is a concept that describes how objects that we are used in daily life will interact and negotiate with other objects over the internet. The amount of devices with Wi-Fi capabilities and built-in sensors keeps on increasing. IoT combines smart devices to provide smart services and applications like smart cities, smart healthcare, smart home, and digital farm etc. But it is very crucial to secure connected IoT devices and networks because of the nature of IoT system. In this paper, the existing works are analyzed and an IoT based healthcare system architecture is proposed. An authentication scheme to enhance the security of the proposed healthcare system is also present.Keywords
Internet of Things, Smart Healthcare System, Secure Authentication, IOT Architecture.References
- National Intelligence Council, Disruptive Civil Technologies – Six Technologies with Potential Impacts on US Interests Out to 2025- Conference Report CR 2008-07, April 2008, Online: www.dni.gov/nic/NIC_home.html.
- Maarten Botterman, “Internet of Things: an early reality of the Future Internet”, European Commission, Information Society and Media Directorate, 2009.
- Gartner-IT-Glossary, available at: http://www.gartner.com/itglossary/ internet-of-things/ 2015.
- Aaditya Jain, Bhuwnesh Sharma, Pawan Gupta, “Internet of Things: Architecture, Security Goals and Challenges-A Survey”, 3rd International Conference on Recent Trends in Engineering Science and Management (ICRTESM), ISBN:978-81-932074-4-4, April 2016.
- Eleonora Borgia, "The Internet of Things vision: Key features, applications and open issues", Computer Communications Vol. 54, pp.1-31, 2014.
- Andrew Whitmore, Anurag Agarwal, and Li Da Xu. "The Internet of Things-A survey of topics and trends", Information Systems Frontiers Vol. 17, Issue. 2, pp. 261-274, 2015.
- Somayya Madakam, R. Ramaswamy, Siddharth Tripathi, "Internet of Things (IoT): A Literature Review", Journal of Computer and Communications, Vol. 3, Issue. 05, pp. 164-173, 2015.
- John Pescatore, and G. Shpantzer, "Securing the Internet of Things Survey", SANS Institute, pp. 1-22, 2016.
- Jorge Granjal, Edmundo Monteiro, and Jorge Sa Silva, "Security for the internet of things: a survey of existing protocols and open research issues", Communications Surveys & Tutorials, IEEE, Vol. 17, Issue 3, pp. 1294-1312, 2015.
- J. Sathish Kumar and Dhiren R. Patel, "A survey on Internet of Things: security and privacy issues", International Journal of Computer Applications, Vol. 90, Issue. 11, pp. 20-26, 2016.
- Md Mahmud Hossain, Maziar Fotouhi, and Ragib Hasan, "Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things", Services, IEEE World Congress on. IEEE, pp. 1-8, 2015.
- Jing, Qi, Athanasios V. Vasilakos, Jiafu Wan, Jingwei Lu, and Dechao Qiu, "Security of the internet of things: Perspectives and challenges.",Wireless Networks, Vol. 20, Issue. 8, pp. 2481-2501, 2014.
- Jan Henrik Ziegeldorf, Oscar García Morchon, and Klaus Wehrle, "Privacy in the Internet of Things: threats and challenges", Security and Communication Networks, Vol. 7, Issue. 12, pp. 2728-2742, 2014.
- Sye Loong Keoh, Sahoo Subhendu Kumar, and Hannes Tschofenig, "Securing the internet of things: A standardization perspective", Internet of Things Journal, IEEE, Vol. 1, N0. 3, pp. 265-275, 2014.
- M. U. Farooq, Muhammad Waseem, Anjum Khairi and Sadia Mazhar "A critical analysis on the security concerns of internet of things (IoT)", International Journal of Computer Applications, Vol. 111, No. 7, pp. 1-6, 2015.
- Sanaz Rahimi Moosavi, Ethiopia Nigussie, Seppo Virtanen and Jouni Isoaho, “An Elliptic Curve-based Mutual Authentication Scheme for RFID Implant Systems”, Procedia Computer Science (Elsevier), Vol. 32, pp. 198 – 206, 2014.
- Manoj Kumar S, “An Analysis of Authentication Schemes for Internet of Things”, International Journal of Engineering Sciences & Research Technology, Vol. 4, Issue 6, pp. 978 – 984, 2015.
- G. Usha Devi, E. Vishnu Balan, M. K. Priyan and C. Gokulnath, “Mutual Authentication Scheme for IoT Application”, Indian Journal of Science and Technology, Vol 8. No. 26, pp. 2-5, 2016.
- Dave Evans, “The Internet of Things: How the Next Evolution of the Internet Is Changing Everything”, CISCO White paper, pp. 1-11, 2011.