Pub Date : 2014-11-01DOI: 10.1109/IC3I.2014.7019753
B. H. Shekar, K. R. Holla, M. Kumari
In this paper, a video retrieval model is developed based on Kirsch local descriptor. In the first stage, the input video is segmented into shots and keyframes are extracted. In the next stage, local descriptors are extracted from each keyframe and clustered into k clusters using k-means clustering procedure. Given a query frame, the local descriptors are extracted from it in a similar manner, and then compared with the descriptors of the database video using k-nearest neighbor search algorithm to find the matching keyframe. Experiments have been performed on the TRECVID video segments to demonstrate the performance of the proposed approach for video retrieval applications.
{"title":"Video retrieval: An accurate approach based on Kirsch descriptor","authors":"B. H. Shekar, K. R. Holla, M. Kumari","doi":"10.1109/IC3I.2014.7019753","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019753","url":null,"abstract":"In this paper, a video retrieval model is developed based on Kirsch local descriptor. In the first stage, the input video is segmented into shots and keyframes are extracted. In the next stage, local descriptors are extracted from each keyframe and clustered into k clusters using k-means clustering procedure. Given a query frame, the local descriptors are extracted from it in a similar manner, and then compared with the descriptors of the database video using k-nearest neighbor search algorithm to find the matching keyframe. Experiments have been performed on the TRECVID video segments to demonstrate the performance of the proposed approach for video retrieval applications.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114078960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/IC3I.2014.7019824
S. V. Vambase, S. Mangalwede
One of the most widely used resources is electricity. However, electrical network has a serious issue of uniform distribution of electricity. This paper investigates the distributed generation systems in electrical network and proposes an interdisciplinary mechanism for effective sharing of electricity across the electrical sub-network. The proposed mechanism is based on wireless mesh network and micro-controller. The proposed system forms a wireless mesh network used to exchange information (such as current status, predicted status of electricity generators) between mesh nodes (in WMN). The information from mesh node is used by micro-controller to drive the electrical devices. The micro-controller is responsible for controlling the direction of flow of electricity and quantity of electricity to be permitted on a particular part of electrical network.
{"title":"A novel cross layer wireless mesh network protocol for distributed generation in electrical networks","authors":"S. V. Vambase, S. Mangalwede","doi":"10.1109/IC3I.2014.7019824","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019824","url":null,"abstract":"One of the most widely used resources is electricity. However, electrical network has a serious issue of uniform distribution of electricity. This paper investigates the distributed generation systems in electrical network and proposes an interdisciplinary mechanism for effective sharing of electricity across the electrical sub-network. The proposed mechanism is based on wireless mesh network and micro-controller. The proposed system forms a wireless mesh network used to exchange information (such as current status, predicted status of electricity generators) between mesh nodes (in WMN). The information from mesh node is used by micro-controller to drive the electrical devices. The micro-controller is responsible for controlling the direction of flow of electricity and quantity of electricity to be permitted on a particular part of electrical network.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114198433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/IC3I.2014.7019809
M. Saikia, R. Kanhirodan
Diffuse Optical Tomography (DOT) is a diagnostic imaging modality, where optical parameters such as absorption and scattering coefficient distributions inside the living tissue are recovered to understand the structural and functional variations in the tissue under study. The numerical method of DOT image reconstruction is an iterative process that demands high computational power, especially in the case of recovering fully three dimensional (3D) optical property distribution inside a complex geometry such as human head which hampers physician to view reconstructed images and monitor a patient in real time. In order to reconstruct 3D DOT images at a high speed, Broyden method based iterative image reconstruction algorithm and a parallelization strategy are employed in CUDA parallel computing platform to utilize tremendous computational power of GPU. Three different single GPU systems equipped with Nvidia Tesla C2070, Tesla k20c and Tesla k40 respectively, and a muti-GPU (two Tesla M2090 GPUs) in a computing node in a HPC cluster are used to evaluate computation performance due to algorithmic improvement and GPU parallel computation. We have used three dimensional finite element method (FEM) and discretized an infant head into 45702 tetrahedral elements and 8703 nodes to solve the forward and inverse problems. We have achieved a significant speedup for the 3D DOT image reconstruction of the head phantom.
漫射光学断层扫描(DOT)是一种诊断成像方式,通过恢复活体组织内部的吸收和散射系数分布等光学参数来了解被研究组织的结构和功能变化。DOT图像重建的数值方法是一个迭代的过程,需要很高的计算能力,特别是在恢复复杂几何结构(如人体头部)内部的三维光学特性分布的情况下,这阻碍了医生查看重建图像和实时监测患者。为了高速重建三维DOT图像,在CUDA并行计算平台上采用基于Broyden方法的迭代图像重建算法和并行化策略,充分利用GPU的巨大计算能力。采用Nvidia Tesla C2070、Tesla k20c和Tesla k40三种不同的单GPU系统,以及HPC集群中一个计算节点的多GPU(两个Tesla M2090 GPU),通过算法改进和GPU并行计算来评估计算性能。采用三维有限元方法,将婴儿头部离散为45702个四面体单元和8703个节点,求解了正逆问题。我们对头部幻影的3D DOT图像重建实现了显著的加速。
{"title":"High performance single and multi-GPU acceleration for Diffuse Optical Tomography","authors":"M. Saikia, R. Kanhirodan","doi":"10.1109/IC3I.2014.7019809","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019809","url":null,"abstract":"Diffuse Optical Tomography (DOT) is a diagnostic imaging modality, where optical parameters such as absorption and scattering coefficient distributions inside the living tissue are recovered to understand the structural and functional variations in the tissue under study. The numerical method of DOT image reconstruction is an iterative process that demands high computational power, especially in the case of recovering fully three dimensional (3D) optical property distribution inside a complex geometry such as human head which hampers physician to view reconstructed images and monitor a patient in real time. In order to reconstruct 3D DOT images at a high speed, Broyden method based iterative image reconstruction algorithm and a parallelization strategy are employed in CUDA parallel computing platform to utilize tremendous computational power of GPU. Three different single GPU systems equipped with Nvidia Tesla C2070, Tesla k20c and Tesla k40 respectively, and a muti-GPU (two Tesla M2090 GPUs) in a computing node in a HPC cluster are used to evaluate computation performance due to algorithmic improvement and GPU parallel computation. We have used three dimensional finite element method (FEM) and discretized an infant head into 45702 tetrahedral elements and 8703 nodes to solve the forward and inverse problems. We have achieved a significant speedup for the 3D DOT image reconstruction of the head phantom.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114536581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/IC3I.2014.7019660
H. C. Vinod, S. Niranjan, V. N. Manjunath Aradhya
Text that appears in images contains important and useful data. Text detection and extraction in images have been applied in many applications. In this paper, we propose n Fourier-Statistical Features in RGB space and Mathematical statistical method for detecting and extracting text in camera images. In RGB space Fourier-Statistical Features is used for detecting text in the image of complex background, contrasting fonts, distinct scripts and different font sizes, In RGB space Fourier transform based features with statistical features and then figured out Fourier-Statistical Features from RGB bands are subject to Fuzzy C-means clustering to classify text pixels from the image background. Classified text pixels of text blocks are determined by inspecting the projection profiles, mathematical statistical method and extract the text part from the image. The suggested approach is examined by carrying on experiments on images of low contrast, complex background, multilingual languages, contrasting fonts, and sizes of text in the image.
{"title":"An application of Fourier statistical features in scene text detection","authors":"H. C. Vinod, S. Niranjan, V. N. Manjunath Aradhya","doi":"10.1109/IC3I.2014.7019660","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019660","url":null,"abstract":"Text that appears in images contains important and useful data. Text detection and extraction in images have been applied in many applications. In this paper, we propose n Fourier-Statistical Features in RGB space and Mathematical statistical method for detecting and extracting text in camera images. In RGB space Fourier-Statistical Features is used for detecting text in the image of complex background, contrasting fonts, distinct scripts and different font sizes, In RGB space Fourier transform based features with statistical features and then figured out Fourier-Statistical Features from RGB bands are subject to Fuzzy C-means clustering to classify text pixels from the image background. Classified text pixels of text blocks are determined by inspecting the projection profiles, mathematical statistical method and extract the text part from the image. The suggested approach is examined by carrying on experiments on images of low contrast, complex background, multilingual languages, contrasting fonts, and sizes of text in the image.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116752083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/IC3I.2014.7019780
Meenakshi D'Souza, S. Ramesh, M. Satpathy
AADL (Architectural Analysis and Design Language) can describe the architecture of an embedded control system at various levels of abstraction. In addition, AADL supports refinement mechanisms for refining abstract models to more detailed ones. However, the refinement mechanism in AADL is of informal nature. Event-B is an independent formal modelling notation for rigorous development of software systems. In Event-B, consistency of a model and refinement relationship can be formally verified. In this paper, we consider a meaningful subset of AADL, and give its semantics in terms of refinement and model decomposition mechanism of Event-B. An AADL model at any level of abstraction can be mapped to an Event-B model, and in the process, the informal refinement relationship between AADL models can be formalized in Event-B. In addition, the decomposition of a component into sub-components can be mapped to Event-B decomposition. We discuss our approach by referring to the case study of a simplified Cruise Controller.
{"title":"Architectural semantics of AADL using Event-B","authors":"Meenakshi D'Souza, S. Ramesh, M. Satpathy","doi":"10.1109/IC3I.2014.7019780","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019780","url":null,"abstract":"AADL (Architectural Analysis and Design Language) can describe the architecture of an embedded control system at various levels of abstraction. In addition, AADL supports refinement mechanisms for refining abstract models to more detailed ones. However, the refinement mechanism in AADL is of informal nature. Event-B is an independent formal modelling notation for rigorous development of software systems. In Event-B, consistency of a model and refinement relationship can be formally verified. In this paper, we consider a meaningful subset of AADL, and give its semantics in terms of refinement and model decomposition mechanism of Event-B. An AADL model at any level of abstraction can be mapped to an Event-B model, and in the process, the informal refinement relationship between AADL models can be formalized in Event-B. In addition, the decomposition of a component into sub-components can be mapped to Event-B decomposition. We discuss our approach by referring to the case study of a simplified Cruise Controller.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114440041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/IC3I.2014.7019640
Nikhil P. Wyawahare, S. Haridas
This paper is based on deployment of white spaces which are free or unused frequency space. This term related with Television frequency broadcast range is known as TV White Space (TVWS). So the transition of analog TV signals into digital TV signals results in creation of some more free frequency spectrum that also adds up to more TV white Spaces, since earlier TV channels which were being transmitted were allotted a certain UHF/VHF frequency channel bands. Now these TV channels are encoded digitally in a slightly different band and then transmitted. With this, the availability of White Space Spectrum has increased and so, many wireless solution providers are getting attracted to develop and deploy as opportunistic spectrum access in Wi-Fi like systems working on TV White Spaces. In time domain (TDMA) these white spaces can be referred as free or unused time slots. And are selected for transmission of messages using message generator, here selection and detection is done at transmitter section.
{"title":"Designing challenges to utilize white-space for configurable femtocell base on slotted TDM","authors":"Nikhil P. Wyawahare, S. Haridas","doi":"10.1109/IC3I.2014.7019640","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019640","url":null,"abstract":"This paper is based on deployment of white spaces which are free or unused frequency space. This term related with Television frequency broadcast range is known as TV White Space (TVWS). So the transition of analog TV signals into digital TV signals results in creation of some more free frequency spectrum that also adds up to more TV white Spaces, since earlier TV channels which were being transmitted were allotted a certain UHF/VHF frequency channel bands. Now these TV channels are encoded digitally in a slightly different band and then transmitted. With this, the availability of White Space Spectrum has increased and so, many wireless solution providers are getting attracted to develop and deploy as opportunistic spectrum access in Wi-Fi like systems working on TV White Spaces. In time domain (TDMA) these white spaces can be referred as free or unused time slots. And are selected for transmission of messages using message generator, here selection and detection is done at transmitter section.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128250263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/IC3I.2014.7019696
B. Beena, C. Prashanth
In this paper, we present few energy-cognizant algorithms using slack reclamation method. In the present design, the Earliest-Deadline-First (EDF) scheduling policies have been employed on the both CPUs for the dynamic tasks and FIFO scheduling for static tasks. When a new task arrives and the primary processor is active then that task will be scheduled in secondary if that processor is inactive else based on priority context switching will happen. The proposed System shows significant energy saving compared to existing SSPT algorithms.
{"title":"Power cognizant algorithms using slack reclamation method","authors":"B. Beena, C. Prashanth","doi":"10.1109/IC3I.2014.7019696","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019696","url":null,"abstract":"In this paper, we present few energy-cognizant algorithms using slack reclamation method. In the present design, the Earliest-Deadline-First (EDF) scheduling policies have been employed on the both CPUs for the dynamic tasks and FIFO scheduling for static tasks. When a new task arrives and the primary processor is active then that task will be scheduled in secondary if that processor is inactive else based on priority context switching will happen. The proposed System shows significant energy saving compared to existing SSPT algorithms.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133894252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/IC3I.2014.7019594
Thanuja Janarthana Naidu, Nor Asyikin Basri, Saravanan Nagenthram
Functional testing for wireless based graphic user interfaces is one of the most routine and basic quality verification and validation on telecommunication products. These tests are often done based on requirements and specifications set and defined by product designers and original equipment manufacturers. As manual testing consumes considerable resource, having various time-to-market periods and user scenarios, automation is vital for testing. There are several tools that could perform automation, so we have conducted a study on two of the most commonly used web automation testing tools to allow test engineers and web and wireless software developers to make an informed decision on which tools to use based on their needs and resource. Which tool would give the best user experience? Which is easier to learn and maintain? Which tool needs lesser test resources and how convenient would the setup be for multiple iteration testing cycles? These, among other questions are answered during the course of this white paper.
{"title":"SAHI vs. Selenium: A comparative analysis","authors":"Thanuja Janarthana Naidu, Nor Asyikin Basri, Saravanan Nagenthram","doi":"10.1109/IC3I.2014.7019594","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019594","url":null,"abstract":"Functional testing for wireless based graphic user interfaces is one of the most routine and basic quality verification and validation on telecommunication products. These tests are often done based on requirements and specifications set and defined by product designers and original equipment manufacturers. As manual testing consumes considerable resource, having various time-to-market periods and user scenarios, automation is vital for testing. There are several tools that could perform automation, so we have conducted a study on two of the most commonly used web automation testing tools to allow test engineers and web and wireless software developers to make an informed decision on which tools to use based on their needs and resource. Which tool would give the best user experience? Which is easier to learn and maintain? Which tool needs lesser test resources and how convenient would the setup be for multiple iteration testing cycles? These, among other questions are answered during the course of this white paper.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133602660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/IC3I.2014.7019739
Vandana S. Bhat, J. Pujari
This paper proposes a method for detecting faces in a given image by combining Gabor filter and Neural network. The first phase uses gabor filter which generates a feature set. Face and non face templates is taken and processed with gabor filter.The face images are present in spatial (time) domain. The conversion of images into frequency domain is processed through inverse fast fourier transform. The subsequent frequency domain images is conjugated with gabor filter bank and feature vector is generated. The second phase involves a method where all the features are given as input to neural network of 2 hidden layer with scaled conjugate training. Thus this approach being deployed, is a convolution of Gabor filter with frequency domain of training and test images provided a feature vector that was sourced to neural network. Proposed system was tested and the results indicated the efficient performance.
{"title":"An approach for face detection using artificial intelligence","authors":"Vandana S. Bhat, J. Pujari","doi":"10.1109/IC3I.2014.7019739","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019739","url":null,"abstract":"This paper proposes a method for detecting faces in a given image by combining Gabor filter and Neural network. The first phase uses gabor filter which generates a feature set. Face and non face templates is taken and processed with gabor filter.The face images are present in spatial (time) domain. The conversion of images into frequency domain is processed through inverse fast fourier transform. The subsequent frequency domain images is conjugated with gabor filter bank and feature vector is generated. The second phase involves a method where all the features are given as input to neural network of 2 hidden layer with scaled conjugate training. Thus this approach being deployed, is a convolution of Gabor filter with frequency domain of training and test images provided a feature vector that was sourced to neural network. Proposed system was tested and the results indicated the efficient performance.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133935279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/IC3I.2014.7019735
C. Saravanakumar, C. Arun
Cloud computing is a service oriented concept which offers everything as a service. These services are deployed at the server with necessary credentials in order to provide reliable services to the customer. The customer always wants to process and store the data in the cloud with an efficient access over different location. The security is the key parameter to secure the customer's data. The cloud computing security issues are addressed in various standards and techniques which lacks in providing a complete solution. The privacy issues in the cloud access are handled and assessed by using privacy protocols and assessment techniques which are also addressed. The trust issues in cloud computing has been addressed with different models. An inter-cloud and intra-cloud standard of cloud interoperability has been identified in order to highlight the challenges exist during the cloud interaction. The cloud resources are deployed over cloud environment with different models also faces a problem. This paper focuses on a recent survey related to the cloud interoperability, security, privacy and trust based on standards and guidelines have been analyzed. The overall focus on this paper is to establish an interoperability among different cloud service providers for effective interaction by maximizing the QoS of cloud computing.
{"title":"Survey on interoperability, security, trust, privacy standardization of cloud computing","authors":"C. Saravanakumar, C. Arun","doi":"10.1109/IC3I.2014.7019735","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019735","url":null,"abstract":"Cloud computing is a service oriented concept which offers everything as a service. These services are deployed at the server with necessary credentials in order to provide reliable services to the customer. The customer always wants to process and store the data in the cloud with an efficient access over different location. The security is the key parameter to secure the customer's data. The cloud computing security issues are addressed in various standards and techniques which lacks in providing a complete solution. The privacy issues in the cloud access are handled and assessed by using privacy protocols and assessment techniques which are also addressed. The trust issues in cloud computing has been addressed with different models. An inter-cloud and intra-cloud standard of cloud interoperability has been identified in order to highlight the challenges exist during the cloud interaction. The cloud resources are deployed over cloud environment with different models also faces a problem. This paper focuses on a recent survey related to the cloud interoperability, security, privacy and trust based on standards and guidelines have been analyzed. The overall focus on this paper is to establish an interoperability among different cloud service providers for effective interaction by maximizing the QoS of cloud computing.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133000618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}