B: Cloud & Distributed

B: Cloud & Distributed (71)

GJCST: B

Cloud computing efficiency, flexibility, greater agility, less capital expenditure is to overcome geographic limitations to compete in a global market. Most of the companies are shifting to Cloud based services, but at the same time they are concerned about the security risks. Hopefully after the definitions and illustrations of Cloud computing are given in this paper you will understand...
Paper Information
Authors Dr. A. Ravi Prasad, J.Kishore Kumar, N. Jayanthi
Read Journal Click Here
Read Paper Click Here

Cloud computing is a new paradigm in the field of distributed computing. The objective of cloud computing is to provide various computing resources over the internet in the form of service to number of cloud consumers. Cloud provides the computing environment to organization in a cost effective manner and give flexibility to increase the number of resources as required during peak load t...
Paper Information
Authors Abhishek Aggarwal, Dr. Sona Malhotra
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 11

The cloud computing is a computing technology that allows us to share the pool of configurable sources where the data of individuals or the organisations can be stored remotely those can be accessible on-demand high quality applications. Even though there are many advantages associated with cloud computing still it brings new challenges in terms of security provided for the data storage ...
Paper Information
Authors Swathi Sambangi
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 5

Cloud computing is an emerging technology and it is purely based on internet and its environment. It provides different services to users such as Software-as-a-Service (SaaS), PaaS, IaaS, Storage-as-a-service (SaaS). Using Storage-as-a-Service, users and organizations can store their data remotely which poses new security risks towards the correctness of data in cloud. In order to achiev...
Paper Information
Authors Ms. B.Tejaswi, Dr.L.V.Reddy, Ms. M.Leelavathi
Read Journal Click Here
Read Paper Click Here
Page No. 19 to 23

As the variety of applications increases so does the complexity of delivering and managing those applications also increases, many organizations tried to manage that complexity by standardizing on a fixed portfolio of applications in a locked-down configuration. This approach reduces the IT labour costs, but the restrictions involved lead to a frustrating user experience and constraints ...
Paper Information
Authors Dr. Kirandeep Kaur, Dr. Gurjit Singh Bhathal
Read Journal Click Here
Read Paper Click Here
Page No. 13 to 18

Cryptography plays a vital role in Internet based applications. Present cryptographic systems on classical computers are providing sufficient security by utilizing symmetric and asymmetric cryptographic technologies but the advent invention of quantum computer makes the present asymmetric cryptographic systems vulnerable. The Quantum theory, which makes present cryptographic systems vuln...
Paper Information
Authors Dr. SGK Murthy, MV Ramana Murthy, M. Shuaib Qureshi, Mohamed Asslam Madathilakath, Mahaboob Sharief Shaik
Read Journal Click Here
Read Paper Click Here
Page No. 15 to 17

Cluster computing systems have recently generated enormous interest for providing easily scalable and cost-effective parallel computing solution for processing large-scale applications. Various adaptive space-sharing scheduling algorithms have been proposed to improve the performance of dedicated and homogeneous clusters. But commodity clusters are naturally non-dedicated and tend to be ...
Paper Information
Authors Dr. Amit Chhabra, Gurvinder Singh
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 8

Data has become the enabling technology for many of the recent innovations. "More data trumps smarter algorithms" has been the mantra behind this revolution in computing. Given the rate at which the data is produced, there is need for scalable solutions to extract information out of them. Allowing the data to be stored in the cloud and be accessed without geographical and scalability lim...
Paper Information
Authors Dr. S. Rajesh, S. Swapna, P.Shylender Reddy
Read Journal Click Here
Read Paper Click Here
Page No. 25 to 29

The current literature shows the existing curriculum models are unable to meet the needs of the today’s dynamic & complex education as the society is more open, diverse, multidimensional, fluid and more problematical. A generic curriculum model is proposed for all types of computer degree programs. The proposed model defines five meta-processes, a flexible structure for ...
Paper Information
Authors Dr. Muhammad Anwar-ur-Rehman Pasha, Dr. Shaheen Pasha
Read Journal Click Here
Read Paper Click Here
Page No. 17 to 24

This paper presents an methodology for attaining high availability to the demands of the web clients. In order to improve in response time of web services during peak hours dynamic allocation of host nodes will be used in this research work. As web users are very demanding: they expect web services to be quickly accessible from the world 24*7. Fast response time leads to high availabilit...
Paper Information
Authors Sukhamrit Kaur, Dr. Kuljit Kaur, Dilbag Singh
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 8

Page 5 of 6