scispace - formally typeset
Search or ask a question

Showing papers by "Mansaf Alam published in 2013"


Proceedings Article
13 Mar 2013
TL;DR: This work has proposed an architecture for management of data in cloud termed as "Cloud Database Management System Architecture", based on the three schema architecture for data base management system and three level object oriented database management system architecture.
Abstract: One of the major challenges for the IT companies today is how to manage large growing volumes of data and how to produce a quality driven software product ensuring optimal utilization of resources with minimum cost. The database management system is a software system i.e. a set of programs that provides its users with processes for defining, building, manipulating and sharing databases amongst the users and applications. A cloud data base management system is a database management system for management of cloud data and provides delivery of computing as services rather than as product. In this paper we have proposed an architecture for management of data in cloud termed as "Cloud Database Management System Architecture". The cloud database management system provides an approach for management of cloud data. The cloud data are spread over the internet and are stored to a remote server managed by a third party. Hence, the cloud data management is a major issue which needs to be catered to. A well-defined architecture is thus required to manage the cloud data, available at a remote location. In this work an architectural model for cloud database management system has been developed .This architecture is based on the three schema architecture for data base management system and three level object oriented database management system architecture.

30 citations


Journal ArticleDOI
TL;DR: A framework for 5-layered architecture in cloud database management system in which data security, storage, backup, load balancing, partitioning, scaling, elasticity, fault tolerance and replication are the important issues.

23 citations


Book ChapterDOI
01 Jan 2013
TL;DR: This paper throws light and categorizes various clustering techniques that have been applied on the web search result into meaningful groups.
Abstract: The over abundance of information on the web, makes information retrieval a difficult process. Today’s search engines give too many results out of which only few are relevant. A user has to browse through the result pages to get the desired result. Web search result clustering is the clustering of results returned by the search engines into meaningful groups. This paper throws light and categorizes various clustering techniques that have been applied on the web search result.

13 citations


Proceedings ArticleDOI
01 Jan 2013
TL;DR: This paper discusses covert channel attacks in VMM, with emphasis on some of its important detection techniques, and analyzes if those are sufficient to list all possible covert channels.
Abstract: This paper discusses covert channel attacks in VMM, with emphasis on some of its important detection techniques. This is an active research area whereby many security frameworks have been proposed for isolating VMs, but still covert channels in commercial clouds exist. Discussion in detail (with examples and expressions) has been done as to how information flow leads to covert channel and the methods used for covert channel detection. In this paper various scenarios are discussed where efforts have been made to detect all possible covert channels and counter the attacks. Among the basic four research areas in the study of covert channels (Define, Detect, Measure and Mitigate), Detection is the most challenging. This paper focuses on various detection techniques and tools available, and analyzes if those are sufficient to list all possible covert channels. A case study of Xen is discussed with respect to a storage covert channel.

6 citations


01 Jan 2013
TL;DR: The prerequisites government agencies should consider before moving to the cloud are identified and various security challenges government organizations may face in the process of Cloud migration and the possible options to mitigate these security threats are examined.
Abstract: Governments of various countries all over the globe, irrespective of their economic & technological standing on the world stage, are realizing the benefits of cloud computing and devising strategies to migrate their IT systems to the Cloud, a trend also called Cloud sourcing. In this paper, we identify the prerequisites government agencies should consider before moving to the cloud. Then we examine various security challenges government organizations may face in the process of Cloud migration and the possible options to mitigate these security threats. Finally, we discuss multiple cloud deployment options and propose a strategy for the government agencies planning to opt for cloud sourcing.

2 citations


DOI
20 Apr 2013
TL;DR: The cloud definition and cloud data manipulation language are proposed as component of cloud query language and retrieval and manipulation cloud data dispersed on different data centre is focused on.
Abstract: This paper deals with the cloud query language for manipulating the cloud data. The cloud definition and cloud data manipulation language are proposed as component of cloud query language. This paper is also focus on retrieval and manipulation cloud data dispersed on different data centre.