NIST Standard Definition on Cloud Computing
[Source]
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model is composed of five essential characteristics, three service models, and four deployment models.
Faculty Members:
- Dr. Pinki Roy, Assistant Professor
- Dr. Ripon Patgiri, Assistant Professor
Publications:
[1] Namasudra, Suyel, and Pinki Roy (2018). “PpBAC: popularity based access control model for cloud computing.” Journal of Organizational and End User Computing (JOEUC) 30, no. 4 (2018): 14-31.
[2] Namasudra and P. Roy (2017), “A new table based protocol for data accessing in cloud computing,” Journal of Information Science and Engineering, vol. 33, no. 3, pp. 585-609, 2017. DOI: 10.6688/JISE.2017.33.3.1.
[3] Namasudra and P. Roy(2017), “Time saving protocol for data accessing in cloud computing,” Journal IET Communications, 2017. DOI: 10.1049/iet-com.2016.0777.
[4] Suyel Namasudra, Pinki Roy, Pandi Vijayakumar, Sivaraman Audithan, and Balamurugan Balusamy. 2017. Time efficient secure DNA based access control model for cloud computing environment. Future Gener. Comput. Syst. 73, C (August 2017), 90–105. DOI:https://doi.org/10.1016/j.future.2017.01.017
[5] Suyel Namasudra, Pinki Roy(2016), “Secure and efficient data access control in cloud computing environment: A survey“, Journal of Multiagent and Grid Systems, 2016
[6] Namasudra, P. Roy and B. Balamurugan(2017), “Cloud computing: fundamentals and research issues”, Proc. of the 2nd International Conference on Recent Trends and Challenges in Computational Models, IEEE, Trivandivanam, India, 2017.
[7] Namasudra, P. Roy, B. Balamurugan and P. Vijayakumar(2017), “Data accessing based on the popularity value for cloud computing,” Proc. of the International Conference on Innovations in Information, Embedded and Communications Systems (ICIIECS), IEEE,Coimbatore, India, Vol. V, pp. 109-104, 2017.
[8] Namasudra, Suyel, and Pinki Roy(2015). “Notice of Retraction Size Based Access Control Model in Cloud Computing” In 2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO), 1-4. IEEE, 2015.
[9] Suyel Namasudra, Pinki Roy(2015), “Size based Access control Model in cloud computing”, International Conference: Electrical, Electronics, Signals, Communication & Optimization-EESCO, 6th ICISA 2015, 24th – 25th Jan-2015,Visakhapatnam, Andhra Pradesh, India.
[10] Ripon Patgiri, Malaya Dutta Borah and Laiphrakpam Dolendro Singh, “SecretStore: A Secrecy as a Service model to enable the Cloud Storage to store user’s secret data“, 26th IEEE Asia-Pacific Conference on Communications (APCC), Kuala Lumpur, Malaysia 10 – 13 October 2021
[11] Ripon Patgiri, “Whisper: A Curious Case of Valid and Employed Mallory in Cloud Computing”, 8th IEEE International Conference on Cyber Security and Cloud Computing (IEEE CSCloud 2021), June 26-28, 2021, Washington DC, USA, DOI: 10.1109/CSCloud-EdgeCom52276.2021.00033.