Work place: FTK-CIT, Jamia Millia Islamia,New Delhi-25, India
E-mail: imrankhan.ee2531@gmail.com
Website:
Research Interests: Computer systems and computational processes, Autonomic Computing, Computer Architecture and Organization, Data Compression, Data Structures and Algorithms
Biography
Imran Khan is a phd research scholar in FTK-Centre for Information Technology, Jamia Millia Islamia, New Delhi, India. His current research works are in Big Data and Cloud Computing. He received BSc (Hons) Chemistry degree and MCA (Master of Computer Science and Application) degree from Aligarh Muslim University (AMU), Aligarh, India.
DOI: https://doi.org/10.5815/ijwmt.2024.01.02, Pub. Date: 8 Feb. 2024
Enhancements and extensions in pervasive computing have enabled penetration of cloud computing enabled services into almost all walks of human life. The expansion of computational capabilities into everyday objects and processes optimizes end users requirement to directly interact with computing systems. However, the amalgamation of technologies like Cloud Computing, Internet of Things (IoT), Deep Learning etc are further giving way to creation of smart ecosystem for smart human living. This transformation in the whole pattern of living as well as working in enterprises is generating high expectations as well as performance load on existing cloud implementation as well as cloud services. In this complete scenario, there are simultaneous efforts on optimizing as well as securing cloud services as well as the data available on the cloud.
This manuscript is an attempt at introducing how cloud computing has become pivotal in the current enterprise setting due to its pay-as -you -use character. However, the allurement of using services without having to procure and retain involved hardware and software also has certain risks involved. The main risk involved in choosing cloud is compromising security concerns. Many potential customers avoid migrating towards cloud due to security concerns. Security concerns for the cloud implementations in the recent times have grown exponentially for all the varied stakeholders involved. The aim of this manuscript is to analyze the current security challenges in the existing cloud implementations. We provide a detailed analysis of existing cloud security taxonomies enabling the reader to make an informed decision on what combination of services and technologies could be used or hired to secure their data available on the cloud.
By Imran Khan S. Kazim Naqvi Mansaf Alam Mohammad Najmud Doja S. Nasir Aziz Rizvi
DOI: https://doi.org/10.5815/ijitcs.2017.10.06, Pub. Date: 8 Oct. 2017
The contemporary era of technological quest is buzzing with two words - Big Data and Cloud Computing. Digital data is growing rapidly from Gigabytes (GBs), terabytes (TBs) to Petabytes (PBs), and thereby burgeoning data management challenges. Social networking sites like Twitter, Facebook, Google+ etc generate huge data chunks on daily basis. Among them, twitter masks as the largest source of publicly available mammoth data chunks intended for various objectives of research and development. In order to further research in this fast emerging area of managing Big Data, we propose a novel framework for doing analysis on Big Data and show its implementation by creating a ‘Twitter Mart’ which is a compilation of subject specific tweets that address some of the challenges for industries engaged in analyzing subject specific data. In this paper, we adduce algorithms and an holistic model that aids in effective stockpiling and retrieving data in an efficient manner.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals