Online ISSN: 2515-8260

Keywords : Cloud Computing


Multi-Attribute Performance Analysis Model For Collaborative Cloud Environment Using TCP

VelMurugeshKumar. N; R. Nedunchelian

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 5, Pages 73-90

The problem of collaborative computing in the cloud environment has been well studied. Several approaches available to handle the issue of collaborative computing and still suffer to achieve higher performance in different QoS parameters. The performance of various simulation models has been analyzed for different parameters in this paper. To improve performance an efficient multi-attribute performance analysis model has been presented. The method first presents a collaborative content sharing strategy (CCSS) which maintains a dual copy of any resource in the cloud which has been accessed by different users. The method enforces an attribute-based update restriction (ABUR) algorithm which uses different keys to restrict malicious updating from different users. The public auditing has been enforced with ABUR and CCSS algorithms. The multi-attribute performance analysis model estimates various QoS parameters like throughput, completion, and public auditing on various simulation models of the cloud environment. A testbed is generated to simulate the performance of different cloud computing tools in a collaborative environment. The performance of simulation models has been measured and compared with the results of other models in detail

Cloud Computing Technology – A Digital Transformative Solution For Banking Industry- An Overview

Dr. Sukhavasi Santha kumari; Dr. N. Aruna

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 2, Pages 5305-5310

The banking industry hosts a large amount of customer data and is always anxious with providing the best services to its customers. In such a scenario, cloud computing technology is the contemporary transformative digital solution that offers unprecedented security, quickness and scalability to banking industry, while improving the ability to manage customer data. Several benefits are offered by Cloud technology such as cost effectiveness, enhanced data processing capacity and high-end financial services, digital accountability, transparency and timeless. Additively the application of cloud computing in banking industry provides the relative solution for the security issues. Large banks, building their own customized financial cloud as a precise tool, in contrary small banks relying on public financial cloud for a cloud service provider, can help their business to grow quickly and effectively by reducing information gap with limited man power. This paper is intended to provide an overview to this advanced technology and advantages of the cloud computing of banking industry above the traditional banking processes.

Online Medical Store Finding And Availability Of Medicine

P.Udith Rao; Mr. K. Logu

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 3, Pages 2220-2226

Now a day in this world most of them are affected by various types of diseases. So the use of medicine is increasing day by days. Every disease has some medicine to treat it. Medicine are of various types they are in the form of liquid, tablet, capsules, drops, injection etc. but in some situation everyone don’t have sufficient time to go to the medical shop for buying their medicines. But medicines are so important for the treatment of their diseases. In chronic type of health issues are based on the medicines availability. Sometimes absences of the medicines change the life of affected person. To avoid such kind of situation this proposed work provides the detail of all the medicine in the pharmacy are stored in with the help of the concepts of cloud computing is the on demand availability of the computer systems resources, mainly data storage and computing power without direct active management by the user.

Enhancement of Big Data Security in Cloud Environment

Anshi Singh; Anjani Rai

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 4, Pages 59-63

In this research, the advanced encryption mechanism is discussed to secure big data in cloud computing. The services of Cloud computing are used on broad level because these services are Platform independent. Cloud computing eliminates the need to set specific software on system of user. To improve the security of cloud, the concept of Advanced Encryption Standard (AES) with Intrusion Detection System (IDS) method is integrated here. It is capable to offer the protection according to demands. It also enlarges the overall time period of the network. It is made to decrease the power utilization by the node. For optimum the local node network is differentiated into little zones. In addition, the algorithm for encoding is mentioned which is used to make encryption with Advanced Encryption Standard (AES).

Analyzing the Performance of Cryptographic Algorithms in Cloud Environment

Devi. T; Ganesan. R

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 4, Pages 2314-2323

People across the globe are very much interested in using latest technology at a lower cost. This is the reason for popularity of cloud services with the help of Internet across the globe. Storing of data in cloud is one of the major functions as outsourcing reduces the burden of local storage and issues related to them. The research focus is on protection of data stored on cloud which is usually sensitive data or private data as well. The protection mechanisms should be in such a way that the mechanisms for protection should be stringent thereby preventing access by the attackers. Manipulation by intruders should also be prevented. Cryptography helps in changing the critical data to a unreadable form so that manipulation by outsiders is not possible. In order to provide security, several approaches and algorithms are available. These algorithms are used based on the requirement of the user or the organization. The paper compares various algorithms available to secure the sensitive data stored in cloud. Key size of the algorithms are compared along with the performances based in the expenses produced in their usage. The results are shown in table which show the algorithms suitable for the purpose of encryption in cloud.

Cloud Computing Technology-Security Issues In Banks-An Overview

Dr. B. Balanagalakshmi; Dr. Sujeevan Kumar Bullard

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 2, Pages 5299-5304

To enhance the capacity for data management and to offer various services, Cloud computing technology is a best source. This technology is providing various services to the customers on demand through internet. Several benefits are provided by this Cloud technology to banks such as reducing costs, improved capacity of data processing and superior excellence in banking services. Financial institutions would use the services of cloud technology with more flexibility and efficiency as and when they require. But several organizations are hesitating to introduce this technology due to security challenges. This paper is studying about the challenges of cloud technology in offering various enhanced services to banks as well as to customers with alternative solution to contain the issues. Moreover, it is discussed about various challenges in offering these financial services to banking institutions. Hence the data is gathered through secondary sources such as newspapers, magazines and various journals. The study is descriptive in nature.

Cloud Computing Security for Electronic Healthcare Records Using Block-chain Model

Dr. A. POOBALAN; Dr. N. Uma Maheswari; Dr. R. Venkatesh

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 4, Pages 2007-2014

This paper presents detailed information about blockchain technology about how blockchain technology is applied for cloud security. Blockchain is one of the novels and ever breaking technology used for high security, which has been used in high-level government applications. In this paper, to tighten the cloud security, the blockchain security model is implemented and integrated with the cloud application. Thus, the healthcare application-based cloud environment is considered as the base application and experiment blockchain algorithm. From the obtained and compared results, it has been found that the blockchain security is highly suitable for cloud security and performs well in securing data during persistence and transmission.

Performance Analysis and Storage Management for Multiple Cloud Service Providers

ANSHY SINGH; SAURABH SINGHAL

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 4, Pages 385-394

SAAS (Storage as a service) is a prominent cloud computing service that helps the cloud users to overcome the bounded resources and the storage expansion by advancing the devices. Data is outsourced by the encryption format due to the security and safety reasons so that the encrypted data generates lot of storage waste in cloud by complicating the data exchange among the authorized users. But here there are many challenges such as storage and managing encrypted data by duplication where as traditional duplication schemes in cloud always focus on application scenarios that are completely controlled by data owners or servers in cloud. Here the flexibility of satisfaction of different requests by data owners on level sensitivity of data. Present paper offers both reduplication scheme managing and access control of same time through multiple cloud service providers (CSP’s) for the evaluation and performance of comparison and implementation additionally security analysis.

Manipulative Cyber Assurance Procedures: The Role of Pre-Communication and Safety Mutuality

Anshey Singh; Anantram .

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 4, Pages 94-97

Cyber protection is a reasonable technique for digital hazard transfers. In any case, it has been indicated that relying upon the highlights of the hidden condition, it could possibly improve the condition of system security. Present paper considers a solitary benefit expanding guarantor (head) with intentionally partaking protects/customers (specialists). We are especially keen on two unmistakable highlights of digital security and their effect on the agreement plan issue. The first is the related idea of digital security, whereby one substance's condition of security depends on its own venture and exertion, yet additionally the endeavors of others' in the equivalent eco-framework (for example externalities). The second is the way that ongoing advances in Internet estimation joined with AI strategies presently permit us to perform precise quantitative evaluations of security act at a firm level. This can be utilized as an apparatus to play out an underlying security review, or prescreening, of a planned customer to all the more likely empower premium segregation and the structure of altered approaches.

Efficient Security Measures to Avoid Data Vul-nerabilities in Cloud Using Encryption Tech-niques

Nomula Manoj Kumar Reddy; S Divya

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 3, Pages 1571-1581

Thetechnology of engineering science is growingfaster and its usage isto bootincreasing speedily. The data and its usage has become an important issue in existence. There by the storage of data may be a crucial issue in means of life. For this data storage, Cloud Computing is useful. Cloud computing is that the follow of using a network of remote servers hosted on internet to store, manage and methodology data on demand and pay as per use. It provides access to a pool of shared resources instead of native servers or personal computers. as a result, outfit do not acquire the things physically, it saves managing value and time for organizations. As a result of the sector of cloud computing is spreading the new techniques are developing. This increase in cloud computing setting to boot can increase security challenges for cloud developers. Most of the organizations are an excellent deal concerned regarding the possession of their data.This analysis paper presents a review on the cloud computing concepts yet as security issues inherent at intervals the context of cloud computing and cloud infrastructure. This paper in addition analyses the key analysis and challenges that presents in cloud computing and offers best practices to service suppliers yet as enterprises. The foremost goal is to review different types of attacks and encryption techniques to secure the cloudmodel.