Archives

2023

Vol 1, No 2 (2023): Serverless Computing Advantages, Challenges, and Future Trends

Author:Akansha Sharma

Abstract:Serverless computing has emerged as a paradigm shift in cloud computing, offering a new model for developing and deploying applications without the need to manage underlying infrastructure. This paper explores the advantages, challenges, and future trends of serverless computing, providing insights into its impact on the development and deployment of applications.

Keywords:  Serverless Computing, Function as a Service (FaaS), Cloud Computing, Advantages, Challenges, Multi-Cloud Serverless, Edge Computing Integration, Serverless Machine Learning

Vol 1, No 2 (2023): Scalability and Elasticity in Cloud Services a Comprehensive Review

Authors:Rajat Kapoor, Shubham Bansal

Abstract:The advent of cloud computing has revolutionized the way organizations deploy and manage their IT infrastructure. Scalability and elasticity are two critical features that contribute to the success of cloud services, enabling businesses to efficiently handle varying workloads and ensuring optimal resource utilization. This paper provides an in-depth exploration of scalability and elasticity in cloud services, discussing their definitions, importance, challenges, and key technologies. Additionally, the paper presents practical examples and case studies to illustrate the implementation of these concepts in real-world scenarios.

Keywords:  Cloud Computing, Scalability, Elasticity, Containerization, Kubernetes, Serverless Computing, Load Balancing, Auto-scaling, Resource Provisioning

Vol 1, No 2 (2023): Navigating Cloud Efficiency: A Comprehensive Guide to MapReduce Monitoring and Implementation

Authors:Sameer Joshi, Akash Gupta

Abstract:We live in an Internet-based world. On-demand information or data is required wherever and whenever it is wanted. Big Data is defined as a large volume of data in many formats that cannot be handled using typical methods such as a database management system. Hadoop's MapReduce is one of the computational techniques used in Big Data Analytics. MapReduce as a Service is provided by the cloud. We examine and analyse the problems and requirements of MapReduce integrity in the cloud in this work. The capabilities of some of the most major integrity assurance frameworks are also examined, as well as future research directions. Algorithms for detecting collusive and non-collusive personnel were discussed.

Keywords: Cloud Computing, Hadoop, MapReduce, Security, Integrity

 

Vol 1, No 2 (2023): Hybrid Cloud Architectures Implementation and Best Practices

Author:Lecturer

Abstract:Hybrid cloud architectures have emerged as a versatile solution to address the dynamic needs of modern businesses, combining the benefits of both public and private clouds. This paper explores the implementation strategies and best practices associated with hybrid cloud architectures, offering insights into key considerations, challenges, and recommendations for organizations seeking to adopt this hybrid approach. The paper also includes relevant tables and figures to illustrate key concepts and comparisons.

Keywords:  Hybrid Cloud Architecture, Cloud Computing, On-Premises Infrastructure, Private Cloud, Public Cloud, Data Integration, Interoperability

Vol 1, No 2 (2023): Federated Learning for Privacy-Preserving Machine Learning

Authors:Kavita Sharma, Mohan Kumar

Abstract:Privacy concerns have become increasingly critical in the era of big data and machine learning. Federated learning has emerged as a promising solution for privacy-preserving machine learning, allowing multiple parties to collaboratively train a model while keeping their data decentralized and secure. This paper provides an in-depth overview of federated learning, its applications, advantages, challenges, and potential future directions. We also include illustrative figures and tables to enhance the understanding of the concepts discussed.

Keywords: Federated Learning, Privacy-Preserving Machine Learning, Decentralized Model Training, Collaborative Model Training, Data Privacy Secure Aggregation, Data Heterogeneity, Communication Efficiency, Edge Computing, Differential Privacy

Vol 1, No 1 (2023): Security Challenges and Mitigation Strategies in Multi-Cloud Environments

Authors:Dr. Jaswant Singh Rao, Anurag Kashyap

Abstract:With the increasing adoption of cloud computing, organizations are leveraging multi-cloud environments to achieve enhanced scalability, flexibility, and cost efficiency. However, the utilization of multiple cloud service providers simultaneously introduces unique security challenges that must be carefully addressed. This article explores the security risks associated with multi-cloud environments and presents effective mitigation strategies to safeguard sensitive information. By implementing these strategies, organizations can ensure data confidentiality, integrity, and availability while harnessing the benefits of cloud computing.

Keywords:Multi-cloud environments, cloud computing, security challenges, mitigation strategies, data confidentiality, data integrity, access control, encryption, multi-factor authentication, security monitoring, vendor evaluation.

Vol 1, No 1 (2023): Block chain Based Cloud Storage System

Authors:  Sarswati Apsingekar, Chaitrali Nakhate, Swamini Tarange, Siddharth Payghan

Abstract: An essential component of the cloud storage environment is data security. Preserving very important user data in the cloud is critical. The Interplanetary File System (IPFS) offers a content-addressable block storage format for storing and distributing files in a distributed environment. It is a version-controlled file system in a peer-to-peer architecture. We have developed a block chain-based architecture to share the file utilizing content-addressable block storage in the peer-to-peer paradigm in accordance with an IPFS feature. We've developed a distributed storage architecture based on block chain technology and IPFS that secures the resource's immutability, integrity, and availability in order to circumvent the availability, dependability, storage overhead, and other problems associated with centralized service providers. In this system, we store the file on IPFS and the transaction-level addressable content (hash) on the block chain. The issue of a centralized service provider's availability, dependability, and storage can be successfully resolved by our suggested plan.

Keywords: IPFS, Cloud Storage Environment, block chain, peer-to-peer

Vol 1, No 1 (2023): Smart Door Locking System Using IOT

Authors:  A.P. Devmore, Payal P. Thombare , Nikita S. Killedar, Prerana A. kamble  ,Sakshi A. Koli

Abstract: Physical keys are the most natural way to lock or open a door, and everyone is familiar with it. Although the physical key is a well-proven and well-known technology, it is not without faults. For a lock, there can only be one unique key. Different keys are required for various locks. Carrying a big number of keys is also inconvenient. Smart locks are key-less door locks that let you unlock your door without having to use areal key. A smart lock is an electromagnetically lock that is meant to lock and unlock a door when it receives instructions from an authorized device and executes the authorization procedure using a cryptography key. Keywords—door lock, Arduino, Smart home, Home automation, Security. Conceptual Security has consistently been a significant worry to the general public either in the family units or the workplace condition. There are different methodologies set up to address these issues. This venture is proposed to build up a savvy locking framework utilizing the Internet of Things. Utilizing conventional keyed locks is basic since the start of humankind, anyway there is a high risk of keys being lost or getting into inappropriate hands. Subsequently, many individuals prefer biometric locks over traditional keyed locks to improve the security of their homes or workplaces. In contrast to the conventional lock, a cutting-edge biometric lock requires no key to bolt or open the door and instead uses a biometric sensor. Our project is an Arduinonano based adaptable working device that provides physical security utilizing the biometric sensor which is available in a smartphone.

Keywords:  internet of things (IOT), sensors, microcontroller, ESP8266, cloud computing with thing Speak, Arduino.

Vol 1, No 1 (2023): Smart Appliance Control over IOT Electricity Generation from Flowing Water in Society

Authors: Ashish Akare, Sayali Mahajan, Gouri Choudhar, Monika Dahale

Abstract: Internet of Things is one of the appear techniques that help in extend over the gap between the physical and cyber world. In the Internet of Things, the different smart objects connected, communicate with each other, data is gathered from the smart objects and based on the need of the users, and the data collection are queried and setback to the user. IOT helps in monitoring electrical and physical parameters. The main goal of this project is to implement green technologies for society to reduce the fuel gobble up costs. Green technology is an alternative energy but inexpensive, efficient and effective. This can open fuel supplies, cost of capital and release. In addition, the aim of this project is to generate electricity by developing a Pico-hydro-generation proto type system that produces low capacity to be used in rural communities. This project has primarily focused on the design and manufacture of a Pico-hydro device that can be used for low capacity equipment such as motor and bulb. In addition, this project will evaluate the generator production based on turbine rotation. In the high-PVC tubing, water flow has the ability to move the turbine where it is attached to a generator to transform mechanical energy into electrical energy. Within this project the pulley system can be seen to improve the turbine’s output. The turbine connecting to the pulley system needed lower speed compared to the turbine directly connecting to the generator.

Keywords: Smart Appliance Control, Electricity Generation, high-PVC tubing, Pico-hydro, IOT Electricity Generation

Vol 1, No 1 (2023): Heart Monitoring System Using ECG

Authors :  Sanket Patil, Satish Patil, Kshitij Kamble, Shubham Patil, Z.Z.Makandar

Abstract: Heart disease like arrhythmia need continual long-term monitoring. For example, in emergency at home, where the patient is unable help themselves or seek help, there is a need for long distance health monitoring for early and faster assessment for treatment. This project presents a remote monitoring system for monitoring the irregularity in heart rate, which enables real-time monitoring for the cardiovascular diseases (CVDs) patient. The sensor is non-invasive where pulse reading is taken from the finger.

 

The microcontroller is used to receive and process the signal. When irregularity in heart rate is detected, the microcontroller will send data to a smartphone using Bluetooth. A mobile application is developed to receive the data and to send out an alert in the form of a text message to another mobile phone. The alert is successfully sent to the specified recipient such as medical doctors or next of kin in the emergency which contain the details such as heart rate information and GPS coordinate. Evaluation on the functionality of the device shows that the developed device can reach accuracy of 97.50%, precision of 96.55%, sensitivity of 99.29% and specificity of 91.67%.

Keywords:  Heart Rate, IOT, GSM module, ESP32 Microcontroller, ECG Sensor AD8232.


1 - 10 of 10 Items