Refine your search
Collections
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Ganpati, Anita
- An Approach for Data Security from Malicious Attacker in Cloud Computing
Abstract Views :216 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, Himachal Pradesh University, Shimla, Himachal Pradesh, 171005, IN
1 Department of Computer Science, Himachal Pradesh University, Shimla, Himachal Pradesh, 171005, IN
Source
Indian Journal of Science and Technology, Vol 9, No 32 (2016), Pagination:Abstract
Objectives: Cloud computing allows clients to access various IT resources online without much expenditure and investment. Although there are various advantages of cloud computing, but still various security threats exist in the cloud environment, e.g. data security, account hijacking, privacy and users’ authenticity. Methods/Statistical Analysis: In this research paper, an empirical approach has been applied which is based upon the program implementation of the proposed model for data security in the cloud environment. The applied approach shows that the proposed model for data security will prevent the cloud data from the fraudulent activities that can be performed at both ends (i.e. cloud provider and cloud user). Findings/Conclusion: In this research paper, a model for data security has been presented which will protect cloud data from malicious insider attacks as well as fraud cloud user simultaneously. It is concluded that a single combined approach is enough to tackle the fraud at both ends i.e. at cloud user end and at cloud provider end. Implementation for above model is also done under compiler “Turbo C” and results are also shown in the form of screenshot for each case. It is also concluded that the cloud provider will have always a proof that he is not responsible for the corruption of cloud user’s data unless he has cloud user’s decryption key. Application/Improvements: The proposed model is applicable as a remedy for repudiation problems and providing better data security in cloud environment. The implemented program can be enhanced using high bit encryption method to improve and provide more data security to the cloud.Keywords
Cloud Data, Cloud Security, Data Security, Encryption, Malicious Attacker, Repudiation.- Open Source Code Coverage Tools for Java: A Comparative Analysis
Abstract Views :160 |
PDF Views:0
Authors
Affiliations
1 Computer Science Department, Himachal Pradesh University, Shimla – 171005, Himachal Pradesh, IN
1 Computer Science Department, Himachal Pradesh University, Shimla – 171005, Himachal Pradesh, IN
Source
Indian Journal of Science and Technology, Vol 9, No 32 (2016), Pagination:Abstract
This research compares two code coverage tools to understand the relationship between the code coverage and regression testing, henceforth the effectiveness of the code coverage detail provided by the tools. The methodology adopted to meet the objectives follows theoretical as well as empirical approach. To achieve the empirical approach a platform was setup in eclipse IDE for Java application which was integrated with Junit to execute test cases for Java program. Two open source code coverage tools CodeCover and Eclemma were exercised respectively upon a small Java application with twenty one test cases. This execution shows that EclEmma is effective in providing the detail of individual test case. CodeCover on the other side provides combined measurement of the test cases. CodeCover provide the coverage at fine level as well as at coarser level of granularity. However regression testing demands detail coverage made by each test case which code cover fails to dispense. EclEmma generates code coverage report by providing information about individual test case. This information is most desirable when performing test case optimization in regression testing. Further coverage details of test suites given by code coverage tool will be used in proposing a hybrid regression test case optimization technique.Keywords
CodeCover, Coverage, EclEmma, Regression Testing, Test Case.- Empirical Validation of Quality for OSS Using CK Metric Suite
Abstract Views :156 |
PDF Views:0
Authors
Affiliations
1 Computer Science Department, Himachal Pradesh University, Shimla, IN
1 Computer Science Department, Himachal Pradesh University, Shimla, IN