CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Synergic Impact of Inhibitors of Cloud Computing - FISM and FMICMAC Approach

by Ambika Devi Amma. T, Radhika. N, Pramod.v. R
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 87 - Number 11
Year of Publication: 2014
Authors: Ambika Devi Amma. T, Radhika. N, Pramod.v. R
10.5120/15253-3909

Ambika Devi Amma. T, Radhika. N, Pramod.v. R . Synergic Impact of Inhibitors of Cloud Computing - FISM and FMICMAC Approach. International Journal of Computer Applications. 87, 11 ( February 2014), 24-29. DOI=10.5120/15253-3909

@article{ 10.5120/15253-3909,
author = { Ambika Devi Amma. T, Radhika. N, Pramod.v. R },
title = { Synergic Impact of Inhibitors of Cloud Computing - FISM and FMICMAC Approach },
journal = { International Journal of Computer Applications },
issue_date = { February 2014 },
volume = { 87 },
number = { 11 },
month = { February },
year = { 2014 },
issn = { 0975-8887 },
pages = { 24-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume87/number11/15253-3909/ },
doi = { 10.5120/15253-3909 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:06:25.080817+05:30
%A Ambika Devi Amma. T
%A Radhika. N
%A Pramod.v. R
%T Synergic Impact of Inhibitors of Cloud Computing - FISM and FMICMAC Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 87
%N 11
%P 24-29
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud services enable continent on demand network access to a shared pool of configurable computing resources. Data migration within cloud is complicated. Cloud computing strategy is subjected to many inhibitors. This paper deals with the deployment of Fuzzy Interpretive Structural Modeling (FISM) to model the interrelationships among the inhibitors of cloud computing. The model is made based on SSIM, Fuzzy initial reachability matrix, fuzzy final reachability matrix and stagnation matrix. From MICMAC analysis the most sensitive inhibitors are identified.

References
  1. Wang. C and Wulf W. A. , "Towards a framework for security measurement", 20th National Information Systems Security Conference, Baltimore, MD, Oct. 1997, pp. 522-533.
  2. Savola. R and Abie. H, "Development of measurable security for a distributed messaging system," International Journal on Advances in Security, Vol. 2, No. 4 (2009), 2010.
  3. Jaquith. A, "Security metrics: replacing fear, uncertainty and doubt,"Addison-Wesley, 2007.
  4. Gadia. S, "Cloud computing: an auditor's perspective," ISACA Journal, Vol. 6, 2009.
  5. Gellman. R, "Privacy in the clouds: risks to privacy and confidentiality from cloud computing," World Privacy Forum (WPF) Report, Feb. 23,2009.
  6. Cloud Security Alliance, "Top threats to cloudcomputing", Version 1. 0. Downloaded from: www. cloudsecurityalliance. org [July 4, 2010].
  7. Sage. A, Interpretive Structural Modeling: Methodology for Large-scale Systems, 91–164. McGraw-Hill, New York, 1977.
  8. Warfield. J. Developing inter-connection matrices in structural modeling. IEEE Transactionsons on Systems, Man and Cybernetics, 2005, 4(1): 81–67.
  9. Wang. C, "Forrester: A close look at cloud computingsecurityissues," http://www. forrester. com/securityforum2009, 2009.
  10. IDC, "It cloud services user survey, pt. 2: Top benefits & challenges," http://blogs. idc. com/ie/?p=210, 2008.
  11. Zetta, "Zetta: Enterprise cloud storage on demand," http://www. zetta. net/, 2008.
  12. Chen. P, Lee. E, Gibson. G, Katz. R, and Patterson. D, "RAID: High performance,reliable secondary storage," ACM Computing Surveys (CSUR), vol. 26, no. 2, pp. 145–185, 1994.
  13. Yahoo!, "Hadoop distribted file system architecture," http://hadoop. apache. org/common/docs/current/hdfs design. html, 2008.
  14. Dwork. C et al. , "Differential privacy," LECTURE NOTES IN COMPUTER SCIENCE, vol. 4052, p. 1, 2006.
  15. Dwork. C, "Differential privacy: A survey of results," Lecture Notes in Computer Science, vol. 4978, p. 1, 2008.
  16. Dean. J and Ghemawat. S, "MapReduce: simplified data processing on large clusters," in Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation-Volume 6 table of contents, 2004, pp. 10–10.
  17. Bardin, J"Security Guidance for Critical Areasof Focus in Cloud Computing," www. cloudsecurityalliance. org/guidance/csaguide. pdf, 2009.
  18. Hwang, K G. Fox, and Dongarra. J, Distributed Systems and Cloud Computing: Clusters, Grids/P2P, and Internet Clouds, Morgan Kaufmann, to appear, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Fuzzy ISM MICMAC Cloud inhibitors.