1) IRAJ is moving to next issue from 16th April 2015.
2) IRAJ Management has issued a thank you note to all the editors for their constant endeavours for enhancement for IRAJ.
3) Chief editor of IRAJ has achieved UGC Net qualification.
|VOLUME 14, ISSUE 1, 1 October, 2018 To 31 December, 2018|
|VOLUME 13, ISSUE 1, 1 April, 2017 To 30 June, 2017|
|VOLUME 12, ISSUE 1, 1 January, 2017 To 31 March, 2017|
|VOLUME 11, ISSUE 1, 16 October, 2016 To 31 December, 2016|
|VOLUME 9, ISSUE 1, 15 April, 2016 To 14 June, 2016|
|VOLUME 8, ISSUE 1, 15 January, 2016 To 14 April, 2016|
|VOLUME 7, ISSUE 1, 15 October, 2015 To 14 January, 2016|
|VOLUME 6, ISSUE 1, 15 July, 2015 To 14 October, 2015|
|VOLUME 5, ISSUE 1, 16 April, 2015 To 15 July, 2015|
|VOLUME 4, ISSUE 1, 16 January, 2015 To 15 April, 2015|
|VOLUME 2, ISSUE 1, 16 August, 2014 To 15 November, 2014|
|VOLUME 1, ISSUE 1, 15 June, 2014 To 15 August, 2014|
Fault Tolerance in cloud is a major concern to guarantee the availability and reliability of critical services as well as application execution. In order to minimize failure impact on the system and application execution, failures should be anticipated and proactively handled. Many research issues are required to be fully addressed in cloud such as Fault tolerance, workflow management, workflow scheduling, security, etc. The task of offering fault tolerance as a service requires the service provider to realize generic fault tolerance mechanisms such that the clientaETMs applications deployed in virtual machine instances can transparently obtain fault tolerance properties. To this aim, we offer to apply hybrid mechanism of VM migration to reduce the occurrences of the faults and a pre-copy mechanism is proposed to be applied for recovering the instance of the VM when fault occurs.
The subscriber management system is used by various companies to provide specific services to their clients, based on memberships taken by them for specific services. Some of the services are free and some are paid but both requires users to register online and login for availing the services. A mobile agent can be used to check the access level of the various subscribers along with their security checks in regular interval. Two agents can be created to serve the purpose when one shall provide the authentication and the other shall provide the authorization services. Application of multi-mobile agent in the trusted server environment is not only provides security as in the base paper but will enhance the security to a great extent. It will also enhance the performance of the system due to local processing over the end terminals. This work proposes to involve the mobile agent based security over the cloud and also provides a basic implementation of the proposed system using an example application of subscriber management system
Privacy preserving is majorly concerned on application and evaluation of security of data. In Data Mining, confidentiality of huge data where users of the system requires to get collaborative access then the complete system is termed as Collaborative Privacy Preserving. The application of privacy preserving of data in collaborative environment faces the problem of low performance and accuracy along with the high security needs. It also requires for providing ease of access for the destined users. This paper proposes a high performance and accuracy based system for collaborative privacy preserving data mining and based on characteristics of the data for faster access as well for the users of the system. The proposed system has been implemented and results have been obtained and presented using tables and graphs.
Cloud computing describes a new supplement, consumption and delivery model for IT services based on Internet, and it typically involves the provision of dynamically scalable and often virtualized resources as a service over the Internet. Cloud computing is spreading around the world and causing the researchers to focus on security of the data over it. These are first, making it possible to communicate between two or more clouds and second, security of communication. The techniques which can be used in hybrid cloud securities are to share the challenge text between the clouds before actual communication should start for authentication. The various works done in this area till now are oriented on other techniques of security between the two or more clouds in a hybrid cloud. Cloud Computing is facilitating users around the world for the best of the services available across the world on their machines through web. It is beneficial for both the service providers (they get huge clientele) and clients (they get all available services).