IJATCA solicits original research papers for the January – 2025 Edition.
Last date of manuscript submission is January 30, 2025.
Cloud computing is a model that enables convenient and on demand network access to a shared pool of configurable computing resources where millions of users share an infrastructure. Privacy and Security is significant obstacle that is preventing the extensive adoption of the public cloud in the Industry. Multi-tenancy where multiple tenants share cloud infrastructure poses an additional concern about the deliberate or accidental exposure of data. In this paper, the authors preserved privacy of data storage through k-mean clustering algorithm, IP addressing based detection technique, Longitude and latitude technique and cryptography technique for data uploading on cloud.
P.Mell and T. Grance, “The NIST Definition of Cloud Computing”, 2011.
Services in the Cloud Computing Era: A Survey
M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica,et al., “Above the clouds: A Berkeley view of cloud computing,” University of California, Berkeley,Tech. Rep, 2009.
Collaborative Network Security in Multi-Tenant Data Center for Cloud Computing
Cloud Computing Architectures Based Multi-Tenant IDS
A Survey of Clustering Algorithms for Big Data: Taxonomy and Empirical Analysis
Khaled Hammouda and Fakhreddine Karray, “A Comparative Study of Data Clustering Techniques,” in Tools of Intelligent Systems Design,2000.
Dawei Suna, Guirau Chaugb, Lina Suna, Xingwei Wanga, \"Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments\", Procedia Engineering, Volume 15, Pages 2852-2856, 2011.
Tanzim Khorshed, Shawkat Ali, Saleh A. Wasimi, \"A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing\", Future Generation Computer Systems, Volume 28, Issue 6, Pages 833-851, June 2012.
Dimitrios Zissis, Dimitrios Lekkas, \"Addressing cloud computing security issues\", Future Generation Systems, Volume 28, Issue 3, Pages 583-592, March 2012.
\"Securing Multi-tenaucy and Cloud Computing Security that ensures tenants do Not pose a risk to one another In terms of data loss, Misuse, or privacy Violation\", Juniper Networks, Inc, Mar 2012.
C.I. Mary, and S.V.K. Raja, “Refinement of clusters from k-means with ant colony optimization,” Journal of Theoretical and applied Information Technology, 9(2):28-32, 2009.
A Cost Effective Clustering based Anonymization Approach for Storing PHR’s in Cloud.
Computing, Multi-tenancy, IP addressing, K-mean clustering, Cryptography
IJATCA is fuelled by a highly dispersed and geographically separated team of dynamic volunteers. IJATCA calls volunteers interested to contribute towards the scientific development in the field of Computer Science.