Time filter

Source Type

Velmurugan J.,VelTech HighTech Engineering CollegeTamilNadu | Anandha Kumar P.,Anna University
International Journal of Applied Engineering Research | Year: 2014

Cloud Computing is a general term used to describe a new class of network based computing that takes place over the Internet, for communication and transport provides hardware, software and networking services to clients. In addition, the platform provides on demand services, that are always on, anywhere, anytime and any place. It has an ability to provide users dynamically scalable, shared resources over the Internet and avoid large upfront fixed costs. Along with these advantages, storing a large amount of data including critical information on the cloud motivates highly skilled hackers thus creating a need for the security to be considered as one of the top issues. Lack of security is the only a problem or difficulty that must be overcome in wide adoption of cloud computing. Cloud computing has brought lots of security challenges for the consumers and service providers. In this paper we emphasize on various security threats in cloud computing also the existing methods to control them and explain the cloud computing along with its open secure architecture. © Research India Publications.

Vishnukumar A.,VelTech HighTech Engineering CollegeTamilNadu | Anandha Kumar P.,Anna University
International Journal of Applied Engineering Research | Year: 2014

Cloud architecture has now become the most prevalent modern IT-technology providing utility services and applications in a virtualized manner. However, these virtualized data centres suffer from increasingly various security threats. Also, overhead caused by the hypervisors has become a serious concern in paravirtualized and hardware virtual machines. In order to provide scalable, efficient and secure cloud environment, our proposed system aims on improving performance of cloud by buffering the data in hypervisor rather than forwarding individual packets during server consolidation. Also a special IDS (along with NICE) software within virtual machine is designed for hostbased security integrated with HASBE for privacy. In addition, we propose a sensor based IDS that continuously monitors data flow with consideration to elasticity of cloud. © Research India Publications.

Gandhiraja R.,VelTech HighTech Engineering CollegeTamilNadu | Praveen T.,VelTech HighTech Engineering CollegeTamilNadu | Kavitha R.,VelTech HighTech Engineering CollegeTamilNadu
International Journal of Applied Engineering Research | Year: 2014

Cooperative diversity is a technique in which various radio terminals relay signals for each other. Cooperative diversity results when cooperative communications is used primarily to leverage the spatial diversity available among distributed radios. In this paper different cooperative diversity schemes and their applications in various wireless networks are discussed. In this paper the impact of cooperative diversity on the energy consumption and lifetime of sensor network and the impact of cooperation in cognitive radio are discussed. Here, user scheduling and radio resource allocation techniques are also discussed which are developed in order to efficiently integrate various cooperative diversity schemes for the emerging IEEE 802.16j based systems. © Research India Publications.

Discover hidden collaborations