Survey: SOA Architecture in Cloud Computing
Priyanka Pandey,
Prasant Kumar Pattnaik,
Raghvendra Kumar
Issue:
Volume 2, Issue 1, January 2016
Pages:
1-4
Received:
7 January 2016
Accepted:
13 January 2016
Published:
23 January 2016
Abstract: Design of software solution for delivery as a shared service over Cloud requires specific considerations. In this chapter we describe an approach for design of infrastructure resource management as a service for use by group of institution based on Service Oriented Architecture, Software-as-a-Service, and Cloud Computing paradigms. Our goal in this paper is to propose a architecture mechanism that allows the hiding of a large quantity of data as possible in a database to provide them to other institutions without resulting much difference between the original institution having the data and the other institute accessing them significantly. A fusion of implementation, analysis and evaluation has to be done for hiding information.
Abstract: Design of software solution for delivery as a shared service over Cloud requires specific considerations. In this chapter we describe an approach for design of infrastructure resource management as a service for use by group of institution based on Service Oriented Architecture, Software-as-a-Service, and Cloud Computing paradigms. Our goal in this...
Show More
Aggregation of SOA and Cloud Computing: A Recent Emerging Technology
Raghvendra Kumar,
Prasant Kumar Pattnaik,
Priyanka Pandey
Issue:
Volume 2, Issue 1, January 2016
Pages:
5-8
Received:
7 January 2016
Accepted:
13 January 2016
Published:
23 January 2016
Abstract: Cloud is gaining popularity as means for saving cost of IT ownership and accelerating time to market due to ready-to-use, dynamically scalable computing infrastructure and software services offered on Cloud on pay-per-use basis. Design of software solution for delivery as a shared service over Cloud requires specific considerations. Cloud computing is a way to increase the capacity or add capabilities dynamically without investing in new infrastructure, training new personnel, or licensing new software. It extends Information Technology’s (IT) existing capabilities. In the last few years, cloud computing has grown from being a promising business concept to one of the fast growing segments of the IT industry. But as more and more information on individuals and companies are placed in the cloud, concerns are beginning to grow about just how safe an environment it is. Despite of all the hype surrounding the cloud, enterprise customers are still reluctant to deploy their business in the cloud. Security is one of the major issues which reduces the growth of cloud computing and complications with data privacy and data protection continue to plague the market. The advent of an advanced model should not negotiate with the required functionalities and capabilities present in the current model. A new model targeting at improving features of an existing model must not risk or threaten other important features of the current model. The architecture of cloud poses such a threat to the security of the existing technologies when deployed in a cloud environment. Cloud service users need to be vigilant in understanding the risks of data breaches in this new environment. In this paper, a survey of the different exiting solution and that pose a new solution to the cloud is presented. In this paper we describe an approach for design of infrastructure resource management as a service for use by group of institution based on Service Oriented Architecture, Software-as-a-Service, and Cloud Computing paradigms.
Abstract: Cloud is gaining popularity as means for saving cost of IT ownership and accelerating time to market due to ready-to-use, dynamically scalable computing infrastructure and software services offered on Cloud on pay-per-use basis. Design of software solution for delivery as a shared service over Cloud requires specific considerations. Cloud computing...
Show More
Heal Gossip: A Secure Overlay for Unstructured P2P Networks
Anubhava Srivastava,
Dharmendra Kumar
Issue:
Volume 2, Issue 1, January 2016
Pages:
9-14
Received:
7 January 2016
Accepted:
20 January 2016
Published:
29 January 2016
Abstract: Gossip-based protocols are an e cient mechanism for man-aging pure unstructured peer-to-peer (P2P) networks. Such protocols are Newscast, Cyclone, Lbpcast, etc. They have overcome from several di culties of such P2P random overlay connection. Such difficulties are randomness, high churn rate, very large unstructured distributed net-work, etc. But the performance of all gossip-based protocols have been completely vanished by presence of few malicious nodes. Since, non-detectable messages and behaviour of attackers are not leave them se-cure. These malicious nodes divide the overlay into several isolated clusters such as in Hub Attack or may be engaged non-malicious nodes in such a way that they are denying actual work such as in Denial of Ser-vice (DoS) Attacks. For securing unstructured P2P networks, there are some existing security protocols such as Secure Peer Sampling (SPSS), TooLate, S-Gossip etc. They are able to identify the malicious nodes and restrict them from gossiping. But restricting some malicious nodes on each node is not sufficient the security purpose of such epidemic over-lays. Especially in completely distributed networks, the malicious nodes may affect other non-malicious nodes although they have been already captured and restricted for gossip on others. In this regards, a new gossip mechanism is proposed, named HealGos-sip. It uses an additional property to inform captured malicious nodes on a node to all its neighbours. This process helps to identify and re-strict malicious nodes faster than other security mechanism. The propose mechanism relief the non-malicious nodes from the group of malicious nodes while performing detecting process. Hence, the propose protocol reduces the communication overhead as well as paralyses almost all malicious nodes within the network. For confusing among malicious and non-malicious nodes while detecting, a new variant of Hub attack is pro-posed and is called Hide and Seek (HnS) attack. It is able to miss-lead existing security protocols regarding the restriction of malicious nodes from gossip.
Abstract: Gossip-based protocols are an e cient mechanism for man-aging pure unstructured peer-to-peer (P2P) networks. Such protocols are Newscast, Cyclone, Lbpcast, etc. They have overcome from several di culties of such P2P random overlay connection. Such difficulties are randomness, high churn rate, very large unstructured distributed net-work, etc. But t...
Show More
Efficient Computation of Binomial Coefficients Using Splay Trees
Vinayshekhar Bannihatti Kumar,
Karthik Radhakrishnan,
Aman Kishore Achpal
Issue:
Volume 2, Issue 1, January 2016
Pages:
15-20
Received:
7 January 2016
Accepted:
15 January 2016
Published:
29 January 2016
Abstract: Combinatorics is an important branch of mathematics. Binomial coefficients play an important role in the computation of permutations and combinations in mathematics. This paper describes a novel method of computing coefficients using Splay Trees. The performance in terms of space as well as time efficiency is compared, and conclusions on the technique are offered. We show how this technique is particularly effective in the expansion of a binomial expression.
Abstract: Combinatorics is an important branch of mathematics. Binomial coefficients play an important role in the computation of permutations and combinations in mathematics. This paper describes a novel method of computing coefficients using Splay Trees. The performance in terms of space as well as time efficiency is compared, and conclusions on the techni...
Show More