5
International Journ Internat ISSN No: 245 @ IJTSRD | Available Online @ www Securing Cloud Data Research Scholars, University of ABSTRACT Cloud computing is a new paradigm resources over the network so that the u the resources over the network. The re consists of Platform as a service, Softw and infrastructure as a service. Cloud c basically internet based computing whe are provided on pay as you go model. T pay for the services they want and provided to them on cloud. Since distributed resourcing scheme it is provide security in the cloud. And we a security is the main problem in cloud. I loop hole in cloud which requires seriou this paper we have described the scheme security in cloud using finger print rea module. In this paper first we have security issues and security problem enlighten the steps to increase the secu Our methodology mainly focuses on scanner and GSM module. Keyword: Cloud Computing, Utility com Finger print scanner, GSM module INTRODUCTION Cloud computing provides infrastruct and software as services, which consumers to the basis of pay as you go services are respectively referred to i Infrastructure as a Service (IaaS), P Service (PaaS), and Software as a Se Clouds aim to power the next generatio by architecting them as a network of v (hardware, database, user-interface, app so that users are able to deploy applications globally and on demand a costs depending on users QOS (Quali requirements. Developers with innova new Internet services no longer require outlays in hardware to deploy their serv nal of Trend in Scientific Research and De tional Open Access Journal | www.ijtsr 56 - 6470 | Volume - 2 | Issue – 6 | Sep w.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct with the Application of Image Bilal Hussain CH, Subayyal Department of Computer Science and Engineer Engineering & Technology, Lahore, Pakistan m of shifting user can access esource mainly ware as service, computing is a ere the services The consumers d services are e cloud uses important to also know that It is mainly the us attention. In e to implement ader and GSM discussed the and we have urity in cloud. n finger print omputing, Risk, ture, platform, delivered to o model. These in industry as Platform as a ervice (SaaS). on data centers virtual services plication logic) y and access at competitive ity of Service) ative ideas for e large capital vice, or human expense to operate it. It offers companies by freeing them fro setting up basic hardware infrastructures, and thus en innovation and creating bu services. Before the invention of cloud the infrastructure and softwar basis work, which is very cost the common users and small solved this major problem managing the whole system an Despite of the facts the efficiently and advanced rapi hole in the cloud. The securit strong as it is considered. Because the services are deli the chances of getting hac enormous. That’s why we security of the cloud. Seve provided to increase the securi are going to propose one. CLOUD COMPUTING ARC The major providers of the cl resources i.e. software as a se service and platform as a serv consumers over the internet include Amazon, Google, yaho evelopment (IJTSRD) rd.com p – Oct 2018 2018 Page: 297 e Processing ring, significant benefit to IT om the low level task of (servers) and software nabling more focus on usiness value for their d the users have to buy re to carry out the daily tly and not affordable for l enterprises. The cloud m of purchasing and nd infrastructure. cloud has developed idly there is still a loop ty of the cloud is not as ivered over the network cked and attacked are have to increase the eral methodologies are ity of the cloud. And we CHITECTURE:- loud are providing their ervice, infrastructure as a vice to the customers and t. The major providers oo, Microsoft.

Securing Cloud Data with the Application of Image Processing

  • Upload
    ijtsrd

  • View
    2

  • Download
    0

Embed Size (px)

DESCRIPTION

Cloud computing is a new paradigm of shifting resources over the network so that the user can access the resources over the network. The resource mainly consists of Platform as a service, Software as service, and infrastructure as a service. Cloud computing is a basically internet based computing where the services are provided on pay as you go model. The consumers pay for the services they want and services are provided to them on cloud. Since cloud uses distributed resourcing scheme it is important to provide security in the cloud. And we also know that security is the main problem in cloud. It is mainly the loop hole in cloud which requires serious attention. In this paper we have described the scheme to implement security in cloud using finger print reader and GSM module. In this paper first we have discussed the security issues and security problem and we have enlighten the steps to increase the security in cloud. Our methodology mainly focuses on finger print scanner and GSM module. Bilal Hussain Ch | Subayyal "Securing Cloud Data with the Application of Image Processing" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: https://www.ijtsrd.com/papers/ijtsrd18454.pdf Paper URL: http://www.ijtsrd.com/computer-science/bioinformatics/18454/securing-cloud-data-with-the-application-of-image-processing/bilal-hussain-ch

Citation preview

Page 1: Securing Cloud Data with the Application of Image Processing

International Journal of Trend in

International Open Access Journal

ISSN No: 2456

@ IJTSRD | Available Online @ www.ijtsrd.com

Securing Cloud Data

Research Scholars, Department University of Engineering & Technology, Lahore

ABSTRACT Cloud computing is a new paradigm of shifting resources over the network so that the user can access the resources over the network. The resource consists of Platform as a service, Software as service, and infrastructure as a service. Cloud computing is a basically internet based computing where the services are provided on pay as you go model. The consumers pay for the services they want andprovided to them on cloud. Since cloud uses distributed resourcing scheme it is important to provide security in the cloud. And we also know that security is the main problem in cloud. It is mainly the loop hole in cloud which requires seriouthis paper we have described the scheme to implement security in cloud using finger print reader and GSM module. In this paper first we have discussed the security issues and security problem and we have enlighten the steps to increase the security in cloud. Our methodology mainly focuses on finger print scanner and GSM module.

Keyword: Cloud Computing, Utility computing, Risk, Finger print scanner, GSM module

INTRODUCTION Cloud computing provides infrastructure, platform, and software as services, which delivered to consumers to the basis of pay as you go model. These services are respectively referred to in industry as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Clouds aim to power the next generation data centers by architecting them as a network of virtual services (hardware, database, user-interface, application logic) so that users are able to deploy and access applications globally and on demand at competitive costs depending on users QOS (Quality of Service) requirements. Developers with innovative ideas for new Internet services no longer require large capital outlays in hardware to deploy their service, or huma

International Journal of Trend in Scientific Research and Development (IJTSRD)

International Open Access Journal | www.ijtsrd.com

ISSN No: 2456 - 6470 | Volume - 2 | Issue – 6 | Sep

www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018

Cloud Data with the Application of Image Processing

Bilal Hussain CH, Subayyal Research Scholars, Department of Computer Science and Engineering

f Engineering & Technology, Lahore, Pakistan

Cloud computing is a new paradigm of shifting resources over the network so that the user can access the resources over the network. The resource mainly consists of Platform as a service, Software as service, and infrastructure as a service. Cloud computing is a basically internet based computing where the services are provided on pay as you go model. The consumers pay for the services they want and services are provided to them on cloud. Since cloud uses distributed resourcing scheme it is important to provide security in the cloud. And we also know that security is the main problem in cloud. It is mainly the loop hole in cloud which requires serious attention. In this paper we have described the scheme to implement security in cloud using finger print reader and GSM module. In this paper first we have discussed the security issues and security problem and we have

security in cloud. Our methodology mainly focuses on finger print

Cloud Computing, Utility computing, Risk,

Cloud computing provides infrastructure, platform, and software as services, which delivered to consumers to the basis of pay as you go model. These services are respectively referred to in industry as Infrastructure as a Service (IaaS), Platform as a

ice (PaaS), and Software as a Service (SaaS). Clouds aim to power the next generation data centers by architecting them as a network of virtual services

interface, application logic) so that users are able to deploy and access

lications globally and on demand at competitive costs depending on users QOS (Quality of Service) requirements. Developers with innovative ideas for new Internet services no longer require large capital outlays in hardware to deploy their service, or human

expense to operate it. It offers significant benefit to IT companies by freeing them from the low level task of setting up basic hardware (servers) and software infrastructures, and thus enabling more focus on innovation and creating business value forservices.

Before the invention of cloud the users have to buy the infrastructure and software to carry out the daily basis work, which is very costly and not affordable for the common users and small enterprises. The cloud solved this major problemmanaging the whole system and infrastructure.

Despite of the facts the cloud has developed efficiently and advanced rapidly there is still a loop hole in the cloud. The security of the cloud is not as strong as it is considered.

Because the services are delivered over the network the chances of getting hacked and attacked are enormous. That’s why we have to increase the security of the cloud. Several methodologies are provided to increase the security of the cloud. And we are going to propose one.

CLOUD COMPUTING ARCHITECTUREThe major providers of the cloud are providing their resources i.e. software as a service, infrastructure as a service and platform as a service to the customers and consumers over the internet. The major providers include Amazon, Google, yahoo,

Research and Development (IJTSRD)

www.ijtsrd.com

6 | Sep – Oct 2018

Oct 2018 Page: 297

Image Processing

Engineering,

expense to operate it. It offers significant benefit to IT companies by freeing them from the low level task of setting up basic hardware (servers) and software infrastructures, and thus enabling more focus on innovation and creating business value for their

Before the invention of cloud the users have to buy the infrastructure and software to carry out the daily basis work, which is very costly and not affordable for the common users and small enterprises. The cloud solved this major problem of purchasing and managing the whole system and infrastructure.

Despite of the facts the cloud has developed efficiently and advanced rapidly there is still a loop hole in the cloud. The security of the cloud is not as

the services are delivered over the network the chances of getting hacked and attacked are enormous. That’s why we have to increase the security of the cloud. Several methodologies are provided to increase the security of the cloud. And we

CLOUD COMPUTING ARCHITECTURE:- The major providers of the cloud are providing their resources i.e. software as a service, infrastructure as a service and platform as a service to the customers and consumers over the internet. The major providers include Amazon, Google, yahoo, Microsoft.

Page 2: Securing Cloud Data with the Application of Image Processing

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

@ IJTSRD | Available Online @ www.ijtsrd.com

The services provided by the cloud are mainly platform as a service software as a service and a infrastructure as a service. The three main services are discussed below:Software as a service:- In this type of service the cloud provides the users ability to use the software that basically owned by the cloud. There are many instances of the software and the end users and consumers uses the instance of the software. The main example of the software as a service is salesforce.com Platform as a service:- In this type of the service the cloud provides the user’s ability to program their own software. The cloud provides the users the software to carry out their instructions and execute them. In this type the consumer can make the program according to the software provided by the cloud. For example some clouds give the users platform for the development of software only in C# or only in java or only in C or assembly. There are different platforms provided by different cloud companies.

Infrastructure as a service (IaaS):- Infrastructure as a service provides the user ability to store and compute capabilities over the network. Different type of routers, switches hard drives, servers are pooled together and made available to the users so the users can use them on pay as you go services. This is the most expensive and difficult type of service that is provided to users by the cloud. Cloud computing deployment:- Cloud computing is basically divided into four types:Public cloud:- In this type of cloud the services are pooled together and provided to the consumers as single virtualized services. They are delivered publically and on the common bases so there is no private portion for any one. This type of cloud is basically provided

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018

The services provided by the cloud are mainly platform as a service software as a service and a

The three main services are discussed below:-

In this type of service the cloud provides the users ity to use the software that basically owned by the

cloud. There are many instances of the software and the end users and consumers uses the instance of the

The main example of the software as a service is

In this type of the service the cloud provides the own software. The

cloud provides the users the software to carry out their instructions and execute them. In this type the consumer can make the program according to the

For example some clouds give the users platform for the development of software only in C# or only in java or only in C or assembly. There are different platforms provided by different cloud companies.

Infrastructure as a service provides the user ability to store and compute capabilities over the network. Different type of routers, switches hard drives, servers are pooled together and made available to the users so

em on pay as you go services. This is the most expensive and difficult type of service that

Cloud computing is basically divided into four types:-

In this type of cloud the services are pooled together as single virtualized

. They are delivered publically and on the common bases so there is no private portion for any one. This type of cloud is basically provided by the

government or the big corporations and the companies so that employees or public use them. Public cloud is usually implemented when:1. There are lot of people that need to access the

cloud. 2. You need to testify and program application code.3. You need incremental capacity.4. You are doing big collaborative project. They are typically larger thanAnd they can handle larger mob. Private cloud:- Provide a dedicated instance of these services for your exclusive use and, as a result, caccessed privately. Private cloud is a cloud that is hold by a particular organization. There are basically two flavors of this type of the cloud: 1: On premise private cloud:-

This type of cloud is maintained within a organization own facility. They are of best use when you require complete control over the configurability and security.

2: Externally hosted private cloud:This type of cloud is maintained within a organization but is maintained and setup third party.

Hybrid cloud:- Hybrid cloud is a cloud that is a combination of public and private cloud. Both type of clouds are remain distinct but are bound together by offering the advantage of multiple deployment model.When to use the hybrid cloud:1. The company wants to use the

there are security issues, then hybrid cloud is most suitable.

2. You want to provide the public cloud to users and the public while maintaining a private cloud for the internal company.

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

Oct 2018 Page: 298

government or the big corporations and the companies so that employees or public use them.

Public cloud is usually implemented when:- There are lot of people that need to access the

You need to testify and program application code. incremental capacity.

You are doing big collaborative project.

than other type of clouds. And they can handle larger mob.

Provide a dedicated instance of these services for your exclusive use and, as a result, can be secured and

Private cloud is a cloud that is hold by a particular

There are basically two flavors of this type of the

- This type of cloud is maintained within a

facility. They are of best use when you require complete control over the configurability and security. Externally hosted private cloud:- This type of cloud is maintained within a organization but is maintained and setup third

Hybrid cloud is a cloud that is a combination of public and private cloud. Both type of clouds are remain distinct but are bound together by offering the advantage of multiple deployment model. When to use the hybrid cloud:

The company wants to use the SAAS service but there are security issues, then hybrid cloud is most

You want to provide the public cloud to users and the public while maintaining a private cloud for

Page 3: Securing Cloud Data with the Application of Image Processing

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

@ IJTSRD | Available Online @ www.ijtsrd.com

Characteristics of a cloud:- There are several characteristics of a cloud. Some of them are given below: � Scalability and elasticity:- Clouds are more scalable and have more elasticity than conventional computing. Capabilities can be rapidly and elastically provisioned, in some cases automatically, to quickly scale out and rapidly released to quickly scale in. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be purchased in any quantity at any time. • Availability and reliability:- Cloud are readily available and more reliable than conventional computing in a way that they can accessed anywhere and anytime. Availability is the significant characteristics of a cloud. � Manageability and interoperability:Manageability is also the main feature of the cloud. They are manageable in case some error occurs. And they are interoperable, so that the user can easily operate the cloud without having any problem. � Performance and optimization:- Clouds hold the pool of powerful devices that are responsible for providing the performance to the user. The cloud should also be optimized so that they are able to provide the resources to the user on runtime bases.

� Portability and accessibility:- Clients and consumers should be able to use the cloud and access the cloud with only web browser and nothing else. They are easily accessible and cloud should be portable. Our methodology:- To enhance the security in the cloud we are using finger print scanner and a GSM module. The basic concept behind out methodology is that when the

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018

teristics of a cloud. Some of

more scalable and have more elasticity Capabilities can be

rapidly and elastically provisioned, in some cases y scale out and rapidly

released to quickly scale in. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be purchased in any quantity at

more reliable than conventional computing in a way that they can accessed anywhere and anytime. Availability is the

Manageability and interoperability:- Manageability is also the main feature of the cloud.

manageable in case some error occurs. And they are interoperable, so that the user can easily operate the cloud without having any problem.

the pool of powerful devices that are formance to the user.

The cloud should also be optimized so that they are able to provide the resources to the user on runtime

Clients and consumers should be able to use the cloud b browser and

nothing else. They are easily accessible and cloud

To enhance the security in the cloud we are using GSM module. The basic

concept behind out methodology is that when the

users access the cloud he or she is required to place the password. But as we know the password can be hacked, key logged and can be stolen. So we are using finger print of the user instead of the password. Instead of the password the user is asked to place thethumb on the device (finger print scanner) and the device scans the thumb of the user andwith the database that either the user is authentic or not. If yes the user is authentic the system will send a password to the user cell phone using the module. Then the user will enter the password received on the cell phone on the required field and then accesses the cloud. Only the finger print scanner is sufficient but the GSM module is used to ensure the security of the cloud.

There are basically three phases of the process.We will discuss each phase briefly: 1st phase:- This is the first phase. In this phase the finger print is recorded by the finger print scanner. The user is prompted to place the finger on the device so that the device can get the image of the finger. The image is then saved in to the database if it’s not there. 2nd phase:- In this phase the image of the finger received from the device is checked with the image placed in the database. Basically it matches the bofind similarity between them. If the image passes the test then the process is passed to the third phase. If not the message will be prompted that the user is not authentic. 3rd phase:- In the third phase the, system will send a message to the user cell phone that is basically a code for accessing the system. The user has to enter the given code on the required field to use or enter the cloud. In this phase our GSM module is used.

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

Oct 2018 Page: 299

the cloud he or she is required to place the password. But as we know the password can be hacked, key logged and can be stolen. So we are using finger print of the user instead of the password. Instead of the password the user is asked to place the thumb on the device (finger print scanner) and the device scans the thumb of the user and then check with the database that either the user is authentic or not. If yes the user is authentic the system will send a password to the user cell phone using the GSM module. Then the user will enter the password received on the cell phone on the required field and

Only the finger print scanner is sufficient but the GSM module is used to ensure the security of the

basically three phases of the process. We will discuss each phase briefly:-

This is the first phase. In this phase the finger print is recorded by the finger print scanner. The user is prompted to place the finger on the device so that the device can get the image of the finger. The image is then saved in to the database if it’s not there.

In this phase the image of the finger received from the device is checked with the image placed in the database. Basically it matches the both images and find similarity between them. If the image passes the test then the process is passed to the third phase. If not the message will be prompted that the user is not

In the third phase the, system will send a message to he user cell phone that is basically a code for

accessing the system. The user has to enter the given code on the required field to use or enter the cloud. In this phase our GSM module is used.

Page 4: Securing Cloud Data with the Application of Image Processing

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

@ IJTSRD | Available Online @ www.ijtsrd.com

CONCLUSION:- We have used finger print scanner and GSM moduto enhance and ameliorate the security of the cloud. We have devised a system of finger print detection in which system and cloud will be accessed using the scheme we have devised. First the user places the finger on the device, the device then scans thprint and checks with the database that the given print either exists in database or not. If the print exists in the database the system will send the user a code to enter the cloud. The user is then asked to place the code on the required field. If the code matches then user will be given permission to enter the cloud. Future work:- In future some other techniques can be devised using our methodology as a paragon. Some techniques can be � Iris detection � Face detection Some other modules can also be integrated with our proposed model to enhance the security in cloud. REFERENCES 1. Buyya R, Chee Shin Y, Venugopal S, Broberg J,

Brandic I. Cloud computing and platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems; 2009; 25(6):599

2. Armbrust M, Fox A, Griffith R, Joseph A D, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M. A View of Cloud Computing. Communications of the ACM; 2010; 53(4):50

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018

We have used finger print scanner and GSM module to enhance and ameliorate the security of the cloud. We have devised a system of finger print detection in which system and cloud will be accessed using the scheme we have devised. First the user places the finger on the device, the device then scans the finger print and checks with the database that the given print either exists in database or not. If the print exists in the database the system will send the user a code to enter the cloud. The user is then asked to place the

If the code matches then user will be given permission to enter the cloud.

In future some other techniques can be devised using

be integrated with our proposed model to enhance the security in cloud.

Buyya R, Chee Shin Y, Venugopal S, Broberg J, emerging IT

platforms: vision, hype, and reality for delivering Future Generation

Computer Systems; 2009; 25(6):599–616.

Armbrust M, Fox A, Griffith R, Joseph A D, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M. A View of Cloud Computing.

2010; 53(4):50–58.

3. Subashini S, Kavitha V. A survey on security issues in service delivery models of cloud computing. Journal of Network and Applications; 2011; 4(1):1

4. Takabi H, Joshi J B D, Ahn G. Security aprivacy challenges in cloud computing environments. IEEE Security & Privacy8(6):24–31.

5. Sangroya A, Kumar S, Dhok J, Varma V. Towards analyzing data security risks in cloud computing environments. Communications in Computer and Information Science; 2010; 54:255–265.

6. Boss G, Malladi P, Quan D, LegreCloud computing, http://www.ibm.com/developerswork/websphere/zones/hipods/ library.html.

7. Peter Mell, Timothy Grance. The NIST Definition of Cloud Computing (Draft).http://www.productionscale.com/home/2011/8/7/the-nist-definition-ofcloudcomputingdraft.html#axz z1X0xKZRuf.

8. Cloud Security Alliance. Security guicritical areas of focus in cloudDecemeber, 2009.

9. Pearson, S. and Azzedine BenameuSecurity and Trust Issues Arising from Cloud Computing” in 2010 IEEE Second International Conference Cloud Computing Technology and Science (Cloud Com), page(s): 693-702.

10. Jinzhu Kong, “A Practical Approach to Improve the Data Privacy of Virtual Machines” 2010 IEEE 10th International Conference on Computer and Information Technology (CIT), June 29 2010, pp. 936-941.

11. Esteves, R. M. and Chunming Impact of Privacy in Cloud Computing” in 2010 IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom), Nov. 30-Dec. 3 ,2010, pp. 593

12. Cloud Computing: Web-Based Applications That Change the Way You Work and Collaborate Online Michael Miller

13. Cloud Application Architectures: BApplications and Infrastructure in the Cloud (Theory in Practice) by George Reese.

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

Oct 2018 Page: 300

i S, Kavitha V. A survey on security issues in service delivery models of cloud

Journal of Network and computer Applications; 2011; 4(1):1–11.

Joshi J B D, Ahn G. Security and privacy challenges in cloud computing

ecurity & Privacy; 2010;

Sangroya A, Kumar S, Dhok J, Varma V. Towards analyzing data security risks in cloud computing environments. Communications in Computer and Information Science; 2010;

oss G, Malladi P, Quan D, Legregni L, Hall H. Cloud computing, 2009. ttp://www.ibm.com/developerswork/websphere/zones

Grance. The NIST Definition Cloud Computing (Draft). NIST. 2011.

http://www.productionscale.com/home/2011/8/7/tofcloudcomputingdraft.html

Security Alliance. Security guidance for in cloud computing (v2.1).

Pearson, S. and Azzedine Benameur, “Privacy, Security and Trust Issues Arising from Cloud Computing” in 2010 IEEE Second International Conference Cloud Computing Technology and

Nov 30-Dec 3,2010,

Jinzhu Kong, “A Practical Approach to Improve a Privacy of Virtual Machines” 2010 IEEE

10th International Conference on Computer and Information Technology (CIT), June 29 -July 1,

M. and Chunming Rong, “Social Impact of Privacy in Cloud Computing” in 2010

ternational Conference on Cloud Computing Technology and Science (Cloud

Dec. 3 ,2010, pp. 593-596

Based Applications That Change the Way You Work and Collaborate

Cloud Application Architectures: Building Applications and Infrastructure in the Cloud (Theory in Practice) by George Reese.

Page 5: Securing Cloud Data with the Application of Image Processing

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

@ IJTSRD | Available Online @ www.ijtsrd.com

14. Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (Theory in Practice) by Tim Mathe

15. Dot Cloud: The 21st Century Business Platform Built on Cloud Computing Peter Fingar

16. Ramanujam, S., Gupta, A., Khan, L.,(2009). R2D: Extracting relational structure fromRDF stores. In Proceedings of the ACM/IEEE International Conference on Web Intelligence,Italy

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018

Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (Theory in

Dot Cloud: The 21st Century Business Platform Built on Cloud Computing Peter Fingar

L., & Seida, S Extracting relational structure from

the ACM/IEEE International Conference on Web Intelligence, Milan,

17. Smith, S., & Weingart, S. (1999). Building a high performance, programmable[Special Issue on ComputerComputer Networks, 31, 8311286(98)00019-X

18. Teswanich, W., & Chittayasothorn, SATransformation of RDF Documents and SchemascRelational Databases. IEEE Pacific Rim Conferences on Communications, Computers, and Signal Processing, 38-41.

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

Oct 2018 Page: 301

Weingart, S. (1999). Building a high programmable secure coprocessor

Computer Network Security] 831–860. doi:10.1016 S1389-

, & Chittayasothorn, S. (2007). of RDF Documents and Schemasc to

IEEE Pacific Rim Conferences on Communications, Computers, and Signal