{"title":"The Trusted Hierarchical Access Structure-Based Encryption Scheme for Cloud Computing","authors":"T. Mujawar, L. B. Bhajantri","doi":"10.4018/ijcac.308273","DOIUrl":"https://doi.org/10.4018/ijcac.308273","url":null,"abstract":"Cloud computing delivers various resources and services to users over internet. At present many businesses and individual users are adopting cloud services to avail benefits such as, less time, less cost, less management, and maintenance. Still, security is the primary issue that must be tackled and one of the security issues is access control mechanism. The most widely used access control method includes Ciphertext Policy Attribute based Encryption, which is encrypted access control scheme. In order to ensure trustworthy and encrypted access control, a trusted hierarchical access structure based encryption scheme is proposed in this paper. The proposed scheme uses hierarchical access structure to encrypt multiple messages and avoid generation of multiple ciphertexts. The trust evaluation component is also integrated with the proposed access control mechanism. An efficient method to assign trust level for service providers and data users by utilizing their behavioral parameters is proposed in the paper.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125266893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Load and Cost-Aware Min-Min Workflow Scheduling Algorithm for Heterogeneous Resources in Fog, Cloud, and Edge Scenarios","authors":"Jyoti Bisht, V. Subrahmanyam","doi":"10.4018/ijcac.2022010105","DOIUrl":"https://doi.org/10.4018/ijcac.2022010105","url":null,"abstract":"Fog computing and Edge computing are few of the latest technologies which are offered as solution to challenges faced in Cloud Computing. Instead of offloading of all the tasks to centralized cloud servers, some of the tasks can be scheduled at intermediate Fog servers or Edge devices. Though this solves most of the problems faced in cloud but also encounter other traditional problems due to resource-related constraints like load balancing, scheduling, etc. In order to address task scheduling and load balancing in Cloud-fog-edge collaboration among servers, we have proposed an improved version of min-min algorithm for workflow scheduling which considers cost, makespan, energy and load balancing in heterogeneous environment. This algorithm is implemented and tested in different offloading scenarios- Cloud only, Fog only, Cloud-fog and Cloud-Fog-Edge collaboration. This approach performed better and the result gives minimum makespan, less energy consumption along with load balancing and marginally less cost when compared to min-min and ELBMM algorithms","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130520334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Security-Based Access Control Models for Cloud Computing","authors":"Sandeep Choudhary, Nanhay Singh","doi":"10.4018/ijcac.2022010104","DOIUrl":"https://doi.org/10.4018/ijcac.2022010104","url":null,"abstract":"Access control has become the most necessary requirement to limit unauthorized and privileged access to information systems in cloud computing. Access control models counter the additional security challenges like rules, domain names, job allocation, multi hosting and separation of tasks. This paper classifies the conventional and modern access control models which has been utilized to restrain these access flaws by employing a variety of practices and methodologies. It examine the frequent security threats to information confidentiality, integrity, data accessibility and their approach used for cloud solutions. This paper proposed a priority based task scheduling access control (PbTAC) model to secure and scheduled access of resources & services rendered to cloud user. PbTAC model will ensure the job allocation, tasks scheduling and security of information through its rule policies during transmission between parties. It also help in reducing system overhead by minimize the computation and less storage cost.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"3 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113957164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Capability-Based Access Control With Trust for Effective Healthcare Systems","authors":"S. Kaushik, C. Gandhi","doi":"10.4018/ijcac.297107","DOIUrl":"https://doi.org/10.4018/ijcac.297107","url":null,"abstract":"Because of the expanding fame of distributed storage, numerous medicinal services associations have begun moving electronic wellbeing records or EHR to cloud-based capacity frameworks. This change can diminish the expenses related with the administration of information sharing, correspondence overhead, and improve the Quality of Service. In this paper, we have projected an entrance regulator prototype which depends on the dependability of the mentioned client. This Access Control based Trust Model for Healthcare System structure made out of the trust component, trust model with access control approaches which upgrades exactness and effectiveness of the framework. This entrance control system will guarantee the main trusted and approved client can get to the information and assets. The detail structure and introduction of the working prototype show that the exactness and effectiveness of the social insurance framework identified with cloud are more when contrasted with other trust models.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132469658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing the Security and Performance of Cloud for E-Governance Infrastructure: Secure E-MODI","authors":"H. Lamkuche, Vijaya Bhaskar Kondaveety, Vijaya Lakshmi Sapparam, Shruti Singh, Rajiv Rajpurkar","doi":"10.4018/ijcac.2022010108","DOIUrl":"https://doi.org/10.4018/ijcac.2022010108","url":null,"abstract":"E-Governance is getting momentous in India. Over the years, e-Governance has played a major part in every sphere of the economy. In this paper, we have proposed E-MODI (E-governance model for open distributed infrastructure) a centralized e-Governance system for government of India, the implementation of this system is technically based on open distributed infrastructure which comprises of various government bodies in one single centralized unit. Our proposed model identifies three different patterns of cloud computing which are DGC, SGC and CGC. In addition, readiness assessment of the services needs to migrate into cloud. In this paper, we propose energy efficient VM allocation algorithm to achieve higher energy efficiency in large scale cloud data centers when system on optimum mode. Our objectives have been explained in details and experiments were designed to demonstrate the robustness of the multi-layered security which is an integration of High secure lightweight block cipher CSL along with Ultra powerful BLAKE3 hashing function in order to maintain information security triad.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117102379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. K. Pande, Priyanka Swain, S. K. Nayak, S. K. Panda
{"title":"An Indicator-Based Algorithm for Task Scheduling in Multi-Cloud Environments","authors":"S. K. Pande, Priyanka Swain, S. K. Nayak, S. K. Panda","doi":"10.4018/ijcac.308274","DOIUrl":"https://doi.org/10.4018/ijcac.308274","url":null,"abstract":"Cloud computing is the ability to scale various resources and services that can be dynamically configured by the cloud service provider (CSP) and delivered on demand by the customers. The objective of most of the task scheduling algorithms is to ensure that the overall processing time of all the tasks (i.e., makespan) is minimized. Here, minimization of makespan in no way guarantees the minimization of execution cost. In indicator-based (IBTS) task scheduling algorithm for the multi-cloud environment, we can outline the significant contributions as the following: (1) IBTS achieves multi-objective solutions while considering parameters, makespan, and execution cost. (2) IBTS proposes a normalization framework with time and cost length indicators for efficient task scheduling. (3) The efficacy of the IBTS algorithm is demonstrated using both the benchmark and synthetic datasets. (4) The simulation outcomes of the IBTS algorithm in comparison with three existing task scheduling algorithms, namely ETBTS, MOTS, and PBTS, clearly exhibit superiority, which proves acceptance of IBTS algorithm.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116408578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Dynamic Weighted Averaging Technique for Trust Assessment in Cloud Computing","authors":"Saima Mehraj, M. T. Banday","doi":"10.4018/ijcac.297099","DOIUrl":"https://doi.org/10.4018/ijcac.297099","url":null,"abstract":"In the Cloud computing, trust management has become a key requirement for its security as it has an important role where service-interactions take place in an anonymous environment. Trust assessment is an essential part of trust management technology for making any authorization decisions in the Cloud-based trust authorization system. The critical concern in trust assessment is the optimal assignment of weights to different factors that are involved in the trust assessment of the Cloud computing. The paper proposes a weighted averaging method for the Cloud computing paradigm wherein multiple factors are assigned weights dynamically by WMA-OWA functions. The proposed work overcomes the influence of the inflexibility of subjective weight assignment methods wherein weights are assigned manually or subjectively by experts based on their preferences such as random allocation, expert opinion, and, average weight. The experimental result shows that the proposed method can achieve greater flexibility, adaptability, and dynamic adjustment capability in the Cloud computing.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125941078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Samuel Asare, Winfred Yaokumah, Ernest B. B. Gyebi, J. Abdulai
{"title":"Evaluating the Impact of Cryptographic Algorithms on Network Performance","authors":"Samuel Asare, Winfred Yaokumah, Ernest B. B. Gyebi, J. Abdulai","doi":"10.4018/ijcac.309937","DOIUrl":"https://doi.org/10.4018/ijcac.309937","url":null,"abstract":"Cryptographic algorithms enable secure data communication over public insecure networks. Though they enhance network security, complex cryptographic operations consume substantial amounts of computing resources, introducing significant network overhead costs. This study aims to find the cryptographic algorithm that can efficiently utilize network resources. The study evaluates three cryptographic algorithms with different file formats on varying numbers of node densities. The NS-3 simulator was used to measure latency, data throughput, end-to-end delay, packet delivery ratio, and packet loss of files in text, image, and audio formats. The results find AES as better than DES and 3DES for a large number of node densities for the three file formats in terms of latency, data throughput, end-to-end delay, and packet delivery ratio. However, DES has the lowest packet loss as AES records the highest packet loss. The findings provide researchers avenues for further research and the practitioners the choice of suitable algorithms based on the overhead performance.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130745307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tifinagh Handwriting Character Recognition Using a CNN Provided as a Web Service","authors":"Kadri Ouahab, A. Benyahia, Adel Abdelhadi","doi":"10.4018/ijcac.297093","DOIUrl":"https://doi.org/10.4018/ijcac.297093","url":null,"abstract":"Many cloud providers offer very high precision services to exploit Optical Character Recognition (OCR). However, there is no provider offers Tifinagh Optical Character Recognition (OCR) as Web Services. Several works have been proposed to build powerful Tifinagh OCR. Unfortunately, there is no one developed as a Web Service. In this paper, we present a new architecture of Tifinagh Handwriting Recognition as a web service based on a deep learning model via Google Colab. For the implementation of our proposal, we used the new version of the TensorFlow library and a very large database of Tifinagh characters composed of 60,000 images from the Mohammed Vth University in Rabat. Experimental results show that the TensorFlow library based on a Tensor processing unit constitutes a very promising framework for developing fast and very precise Tifinagh OCR web services. The results show that our method based on convolutional neural network outperforms existing methods based on support vector machines and extreme learning machine.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125371159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Marketing Analytics for Analyzing Social Media and Branding Efforts of Indian Telecom Operators","authors":"Sujata Joshi, Sindhu Koparrati, Vaishali Singhal","doi":"10.4018/ijcac.297092","DOIUrl":"https://doi.org/10.4018/ijcac.297092","url":null,"abstract":"Business Analytics has become the new mantra in today’s digital transformation age. Digitization has changed the way marketing functions. Use of Marketing analytics and Social media platforms are some of the biggest digital transformations, seen in new marketing approaches. However, not much research has been done to witness the influence of the social media in the Indian telecom sector. So the objective of this paper is to study two digitization aspects in marketing which is the application marketing analytics for social media platform with respect to the Indian telecom operators Thus, the research intends to Study the impact of Social Media Efforts (SMME) on Branding and Customer Response (CR) with respect to Indian telecom brands. Primary data was collected from 184 respondents and statistical analysis has been performed to see the effect of SMME on branding and consumer response for telecom brands. Findings of the study confirm that Social Media Marketing Efforts (SMME) have significance impact on both Branding and Consumer Response (CR).","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126276712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}