{"title":"Reliability of cloud computing in Quantum Chemistry calculations","authors":"R. R. Francis","doi":"10.1109/ICCCTAM.2012.6488084","DOIUrl":"https://doi.org/10.1109/ICCCTAM.2012.6488084","url":null,"abstract":"Cloud computing is an emerging technology to the scientific community in variety of disciplines. Especially, in chemistry related fields like bio-informatics, pharmaceutical chemistry and even in chemical industry, its role is significant at present. The research in theoretical chemistry such as Quantum Chemistry, Molecular Modeling, Molecular Dynamics, Theoretical Chemical Kinetics and Chem-informatics, requires extensive computational cost which have been considerably reduced because of this new technology. However, the extent of effectiveness of cloud computing in such studies, if the access is from commercial providers would be unreliable. Here in the advantages of cloud computing in theoretical chemistry, giving emphasis to quantum chemistry calculations with respect to cost, security and accessibility have been reported. The comparison is made with some leading commercial cloud providers and private clouds.","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125786298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The need, use and efficiency of trustworthy security model in Cloud computing for information assurance","authors":"K. Bhamidipati, S. Karanth Shyam","doi":"10.1109/ICCCTAM.2012.6488074","DOIUrl":"https://doi.org/10.1109/ICCCTAM.2012.6488074","url":null,"abstract":"The Cloud computing helps enterprises transform business and technology. It is effective in cost, flexible, and it's a proven delivery platform for providing business or consumer IT services over the Internet. The resources of cloud can be scaled easily and deployed rapidly with all services, applications and processes provisioned “on demand”, regardless of the location of user or device. Thus cloud computing gives organizations the opportunity to improve the efficiencies of service delivery, streamline IT management, and with dynamic business requirements align the IT services better. In many ways, cloud computing offers the “best of both worlds”, providing good support for core business functions along with the capacity to develop new and innovative services. Apart from the usual challenges of developing secure IT systems, cloud computing presents an added level of risk, because essential services are often outsourced to a third party. This aspect of outsourcing makes it difficult to maintain data integrity and privacy, support data and service availability, and demonstrate compliance. This research includes the investigation of implementation structures and assurance provisions for “security” in cloud-based systems.","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131989874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A fine grained access control and flexible revocation scheme for data security on public cloud storage services","authors":"T. Eissa, Gi-Hwan Cho","doi":"10.1109/ICCCTAM.2012.6488066","DOIUrl":"https://doi.org/10.1109/ICCCTAM.2012.6488066","url":null,"abstract":"Cloud computing based storage services have rapidly spread in the market due to their promising capabilities and features. However, the security challenge of outsourcing sensitive data for sharing on the cloud which is not fully controlled by the data owners is still open. In this paper, we present negative and positive attributes in attribute based encryption to support fine grained access control and flexible revocation. The framework is designed to shift the key security roles, such as authentication and key management, from the cloud to be shared between data owners and a trusted third party. Furthermore, this research aims to enable data owner to do most of the heavy re-encryption tasks using the cloud resources and without revealing his data or attributes to the cloud. We propose a flexible revocation solution which enables the owner to revocate users without the need for re-encrypting all the affected files or regenerating system and users' keys. We highlight the performance of our scheme by analyzing its computational complexity.","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133828945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance measure of multi stage scheduling algorithm in cloud computing","authors":"R. Indukuri, P. Varma, G. J. Moses","doi":"10.1109/ICCCTAM.2012.6488062","DOIUrl":"https://doi.org/10.1109/ICCCTAM.2012.6488062","url":null,"abstract":"Scheduling user requests in cloud computing for resource provision is key process in cloud computing. In cloud computing sometimes user request has to be processed with a series of virtual machines from the available resources. Each request ri (1<;=i<;=n) in cloud environment has to complete its workflow on a virtual machine of type VM1 for an instance of Ti1 units time, later on a virtual machine of type VM2 for an instance of Ti2 units of time, and so on, at end on a virtual machine of type VMm for an instance of Tim units of time. Scheduling the requests using FCFS scheduling has the highest Average waiting time and Total elapsed time. The present paper presents a novel approach in cloud computing for resource request scheduling by applying Johnson's Scheduling algorithm to reduce average waiting time and total elapsed time. The simulation results show the significant influence on average waiting time and total elapsed time.","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132931611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ERP on Cloud: Implementation strategies and challenges","authors":"P. Appandairajan, Zafar Ali Khan, M. Madiajagan","doi":"10.1109/ICCCTAM.2012.6488071","DOIUrl":"https://doi.org/10.1109/ICCCTAM.2012.6488071","url":null,"abstract":"This paper aims to discuss about the ERP implementation strategies and challenges in a Cloud Environment. ERP is important business software used in all major enterprises and is a useful tool to coordinate the available resources, information and activities to complete the business process. Its importance in an enterprise has led to an increased demand of the ERP software. ERP in CLOUD environment, will help Medium and small enterprise to use it as per their requirements and will lead to more efficient business process.","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122380275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Utilization of cloud computing in E-learning systems","authors":"N. Radhakrishnan, N. Poorna Chelvan, D. Ramkumar","doi":"10.1109/ICCCTAM.2012.6488100","DOIUrl":"https://doi.org/10.1109/ICCCTAM.2012.6488100","url":null,"abstract":"Cloud computing is one of the most discussed solutions on the education prospect. Cloud computing is growing rapidly, with applications in almost any area, including education. E-learning systems usually require many hardware and software resources. The popularity of learning on the internet, the creation of perfect web-based learning environment has become one of the hot points on researching remote education. It is predicted that, in the near future, cloud computing will have a significant impact on the educational and learning environment, facilitating their own users(i.e., learners, instructors, and administrators) to perform their tasks effectively with less cost by utilizing the available cloud-based applications offered by the cloud service providers. This paper discusses the employability of cloud computing in the educational and learning ring, to be called “Teaching and Learning as a Service” (TLaaS), emphasizing its possible benefits and offerings.","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126140861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A cloud enabled online quiz application deployed on Google cloud","authors":"S. Shetty, S. Vadivel, N. Gandhi","doi":"10.1109/ICCCTAM.2012.6488082","DOIUrl":"https://doi.org/10.1109/ICCCTAM.2012.6488082","url":null,"abstract":"The paper thoroughly discusses the idea of Cloud Computing. It gives a brief overview on the topological architecture, potential uses, concerns, security aspects and various other factors taken into consideration while designing a cloud application. A Google cloud enabled online quiz application is developed and deployed. This application allows students to answer an online quiz from any location, it also allows faculty to conduct online quizzes without having to worry about the quiz evaluation because correction is done instantly by the application and the score generated instantly.","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132137854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Key technologies in cloud computing","authors":"K. Divya, S. Jeyalatha","doi":"10.1109/ICCCTAM.2012.6488097","DOIUrl":"https://doi.org/10.1109/ICCCTAM.2012.6488097","url":null,"abstract":"Cloud computing is an emerging technology which is gaining wide interest both in IT industry and academic research. Instead of buying, setting up and managing hardware resources, users begin to rent virtual machines and storage space. This paper focuses on basic concepts like layered structure of cloud models, deployment models and cloud storage. And also describes how cloud computing services are utilized in Academic environment. Various security risks involved in cloud storage is discussed.","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124535707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applications of cloud computing in remote oil and gas operations","authors":"M. Al Hasan Khan, S. Jailkhani, B. Kumar","doi":"10.1109/ICCCTAM.2012.6488070","DOIUrl":"https://doi.org/10.1109/ICCCTAM.2012.6488070","url":null,"abstract":"This study is based on the various applications that cloud computing finds in petroleum, oil and gas industry. From finding hydrocarbon reserves to their production and conservation as well as feedback collection of efficiency of the said application have been included in the present study. These applications have been touched in detail and their explanations expounded. Some avenues which have scope for future development have been discussed which would enhance hydrocarbon exploration and oil field management.","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"362 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115951570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. K. Sangani, P. Velmurugan, Tejas Vithani, M. Madiajagan
{"title":"Security & Privacy Architecture as a service for Small and Medium Enterprises","authors":"N. K. Sangani, P. Velmurugan, Tejas Vithani, M. Madiajagan","doi":"10.1109/ICCCTAM.2012.6488064","DOIUrl":"https://doi.org/10.1109/ICCCTAM.2012.6488064","url":null,"abstract":"This paper focuses on Security and Privacy for Small and Medium Enterprises pertaining to their dependency on small clouds to carry out their business activities. They lack the knowledge pertaining to the security to be applied to safeguard their data and services due to lack of in-house expert technical resources, security architects or less budgets to carry out the vulnerability study for them and to safeguard their data. Customers can rely on the services offered by the SMEs only if the hired services are secured. SMEs should have a proper understanding of the threats pertaining to the security aspect of the Software as a Service which they undertake. They should be able to investigate and asses the risk involved in showcasing their services on a cloud via the internet. The aim of this paper is to design a framework that brings out a Security & Privacy Architecture as a service for SMEs (SPAaaS) pertaining to Web Applications which can be offered by various security vendors. SPAaaS will assist the SMEs to evaluate the security requirements pertaining to host their data and services on cloud.","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115254024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}