Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper


August Edition 2021

International Journal of Applied Information Systems solicits high quality original research papers for the August 2021 Edition of the journal. The last date of research paper submission is July 15, 2021.

Verified Message Exchange in Providing Security for Cloud Computing in Heterogeneous and Dynamic Environment

Atul Verma, Gaurav Kant Shankhdhar, Manuj Darbari. Published in Security

International Journal of Applied Information Systems
Year of Publication: 2017
Publisher: Foundation of Computer Science (FCS), NY, USA
Authors: Atul Verma, Gaurav Kant Shankhdhar, Manuj Darbari
Download full text
  1. Atul Verma, Gaurav Kant Shankhdhar and Manuj Darbari. Verified Message Exchange in Providing Security for Cloud Computing in Heterogeneous and Dynamic Environment. International Journal of Applied Information Systems 11(10):15-18, February 2017. URL, DOI BibTeX

    	author = "Atul Verma and Gaurav Kant Shankhdhar and Manuj Darbari",
    	title = "Verified Message Exchange in Providing Security for Cloud Computing in Heterogeneous and Dynamic Environment",
    	journal = "International Journal of Applied Information Systems",
    	issue_date = "February 2017",
    	volume = 11,
    	number = 10,
    	month = "Feb",
    	year = 2017,
    	issn = "2249-0868",
    	pages = "15-18",
    	numpages = 4,
    	url = "",
    	doi = "10.5120/ijais2017451648",
    	publisher = "Foundation of Computer Science (FCS), NY, USA",
    	address = "New York, USA"


Providers to cloud computing including Amazon, Google, Microsoft, Rachspace and Terremark have all contributed at a high end for this bulk storage technology. As goes with all the software packages including CRMs and ERPs the need for security has to be redefined, restructured and its domain adjusted because as the development progresses the vulnerabilities are exposed. To deal with the security issues in cloud computing this paper discusses some concepts like ontology, web semantics, and message passing within or between cloud components. This paper introduces a Context Sensitivity Policy approach for the Cloud Security Paradigm.


  1. ROWLBAC - Representing Role Based Access Control in OWL, T. Finin, A. Joshi Univ. of Maryland, Baltimore County finin,This email address is being protected from spambots. You need JavaScript enabled to view it., 2008.
  2. Role Based Access Control and OWL, T. Finin, A. Joshi Univ. of Maryland, Baltimore County finin,This email address is being protected from spambots. You need JavaScript enabled to view it., 2016.
  3. Context-Sensitive Policy Based Security in Internet of Things, Context-Sensitive Policy Based Security in Internet of Things, 2016.
  4. V. G. Cerf, “Prospects for the internet of things,” XRDS, vol. 22, no. 2, pp. 28–31, Dec. 2015. [Online]. Available: 2845145
  5. N. Eddy, “Stress-free parking,” November 2015. [Online]. Available: gartner-21-billion-iot-devices-to-invade-by-2020/d/d-id/1323081.
  6. S. Karnouskos, “Stuxnet worm impact on industrial cyber-physical system security,” in IECON 2011 - 37th Annual Conference on IEEE Industrial Electronics Society, Nov 2011, pp. 4490–4494.
  7. K. Kochetkova, “Shock at the wheel: your jeep can be hacked while driving down the road,” July 2015. [Online]. Available:
  8. S. Khandelwal, “100,000 refrigerators and other home appliances hacked to perform cyber attack,” January 2014. [Online]. Available: http://
  9. I. Gartner, “Gartner’s 2015 hype cycle for emerging technologies identifies the computing innovations that organizations should monitor,” August 2015. [Online]. Available: id/3114217
  10. H. Chen, F. Perich, T. Finin, and A. Joshi, “Soupa: standard ontology for ubiquitous and pervasive applications,” in Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004. The First Annual International Conference on, Aug 2004, pp. 258–267.
  11. L. Kagal, T. Finin, M. Paolucci, N. Srinivasan, K. Sycara, and G. Denker, “Authorization and privacy for semantic web services,” IEEE Intelligent Systems, vol. 19, no. 4, pp. 50–56, Jul 2004.
  12. S. Bechhofer, “Owl: Web ontology language,” in Encyclopedia of Database Systems. Springer, 2009, pp. 2008–2009.
  13. J. Slay and M. Miller, Lessons learned from the maroochy water breach. Springer, 2007.
  14. J. Leyden, “Polish teen derails tram after hacking train network,” The Register, vol. 11, 2008.
  15. D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. H. Maisel, “Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses,” in Security and Privacy, 2008. SP 2008. IEEE Symposium on. IEEE, 2008, pp. 129–142.
  16. M. Abomhara and G. M. Koien, “Security and privacy in the internet of things: Current status and open issues,” in Privacy and Security in Mobile Systems (PRISMS), 2014 International Conference on. IEEE, 2014, pp. 1–8.
  17. K. Zhao and L. Ge, “A survey on the internet of things security,” in Computational Intelligence and Security (CIS), 2013 9th International Conference on. IEEE, 2013, pp. 663–667.
  18. R. Roman, J. Zhou, and J. Lopez, “On the features and challenges of security and privacy in distributed internet of things,” Computer Networks, vol. 57, no. 10, pp. 2266–2279, 2013.
  19. S. N. Narayanan, S. Mittal, and A. Joshi, “Using data analytics to detect anomalous states in vehicles,” arXiv preprint arXiv:1512.08048, 2015.
  20. S. Godik, A. Anderson, B. Parducci, P. Humenn, and S. Vajjhala, “Oasis extensible access control 2 markup language (xacml) 3,” Tech. rep., OASIS, Tech. Rep., 2002.
  21. K. Lalana, “Rei: A policy language for the me-centric project,” TechReport, HP Labs, 2002.
  22. J. M. Bradshaw, A. Uszok, M. Breedy, L. Bunch, T. Eskridge, P. Feltovich, M. Johnson, J. Lott, and M. Vignati, “The kaos policy services framework,” in Proc. 8th Cyber Security and Information Intelligence Research Workshop, 2013.
  23. T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. Winsborough, and B. Thuraisingham, “R owl bac: representing role based access control in owl,” in Proceedings of the 13th ACM symposium on Access control models and technologies. ACM, 2008, pp. 73–82.
  24. NIST, NIST CPS, 2016 (accessed February 1, 2016). [Online]. Available:
  25. X. Jin, R. Krishnan, and R. Sandhu, “A unified attribute-based access control model covering dac, mac and rbac,” in Proceedings of 26th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2012), Paris, France, July 2012.
  26. X. Jin, “Attribute-based access control models and implementation in cloud infrastructure as a service,” Ph.D. dissertation, The University of Texas, San Antonio, May 2014.
  27. M. Dean and G. Schreiber, “Owl web ontology language guide,” W3C Recommendation,, 2004.
  28. N. K. Sharma and A. Joshi, “Representing attribute based access control policies in owl,” in 2016 IEEE Tenth International Conference on Semantic Computing (ICSC), California, USA, Feb 2016, pp. 333–336.
  29. C. Seitz and R. Sch¨onfelder, The Semantic Web – ISWC 2011:10th International Semantic Web Conference, Bonn, Germany, October 23-27, 2011, Proceedings, Part II. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011, ch. Rule-Based OWL Reasoning for Specific Embedded Devices, pp. 237–252. [Online]. Available: 16
  30. L. Zavala, P. K. Murukannaiah, N. Poosamani, T. Finin, A. Joshi, I. Rhee, and M. P. Singh, “Platys: From position to place-oriented mobile computing,” AI Magazine, vol. 36, no. 2, 2015.
  31. Google, “Mark up the world using beacons,” March 2016. [Online]. Available:
  32. IEEE Explore, 2016, Building Custom, Adaptive and Heterogeneous Multi-Agent Systems for Semantic Information Retrieval Using Organizational-Multi-Agent Systems Engineering, O-MaSE, Gaurav Kant Shankhdhar


Cloud computing, Distributed computing, Grid computing, Concurrent computing, Computer science,High performance computing, Parallel processing, Platform virtualization, Computer industry, Network servers