Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 13
Page No. 2228 - 2237

Creation of Software Testing Environment in Cloud Platform

Authors : J. Frank Vijay and B. Hariharan

References

Anitha, D. and M.V. Srinath, 2014. A review on software testing framework in cloud computing. Int. J. Comput. Sci. Inf. Technol., 5: 7553-7562.
Direct Link  |  

Celebi, M.E., H.A. Kingravi and P.A. Vela, 2013. A comparative study of efficient initialization methods for the k-means clustering algorithm. Expert Syst. Appl., 40: 200-210.
CrossRef  |  Direct Link  |  

Cui, X., P. Zhu, X. Yang, K. Li and C. Ji, 2014. Optimized big data k-means clustering using MapReduce. J. Supercomputing, 70: 1249-1259.
CrossRef  |  Direct Link  |  

Dubey, A.K., A.K. Dubey, M. Namdev and S.S. Shrivastava, 2012. Cloud-user security based on RSA and MD5 algorithm for resource attestation and sharing in java environment. Proceedings of the 2012 CSI Sixth International Conference on Software Engineering (CONSEG), September 5-7, 2012, IEEE, Indore, India, ISBN: 978-1-4673-2174-7, pp: 1-8.

Elbaum, S., A. Malishevsky and G. Rothermel, 2002. Test case prioritization: A family of empirical studies. IEEE Trans. Software Eng., 28: 159-182.
CrossRef  |  Direct Link  |  

Hettiarachchi, C., H. Do and B. Choi, 2016. Risk-based test case prioritization using a fuzzy expert system. Inf. Software Technol., 69: 1-15.
CrossRef  |  Direct Link  |  

Jagadeesh, S.A., 2012. Cloud based testing: Need of testing in cloud infrastructures and cloud platforms. Int. J. Comput. Sci. Inf. Technol. Secur., 2: 398-401.
Direct Link  |  

Jiang, B. and W.K. Chan, 2015. Input-based adaptive randomized test case prioritization: A local beam search approach. J. Syst. Software, 105: 91-106.
CrossRef  |  Direct Link  |  

Kaur, M. and U. Kaur, 2013. Comparison between K-mean and hierarchical algorithm using query redirection. Int. J. Adv. Res. Comput. Sci. Software Eng., 3: 1454-1459.

Kumar, A., B.G. Lee, H. Lee and A. Kumari, 2012. Secure storage and access of data in cloud computing. Proceedings of the 2012 International Conference on ICT Convergence (ICTC), October 15-17, 2012, IEEE, Jeju City, South Korea, ISBN: 978-1-4673-4829-4, pp: 336-339.

Li, M., S. Yu, Y. Zheng, K. Ren and W. Lou, 2013. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst., 24: 131-143.
CrossRef  |  Direct Link  |  

Malik, R. and P. Kumar, 2015. Cloud computing security improvement using Diffie Hellman and AES. Int. J. Comput. Appl., 118: 25-28.
Direct Link  |  

Miller, T., 2013. Using dependency structures for prioritization of functional test suites. IEEE. Trans. Software Eng., 39: 258-275.
CrossRef  |  Direct Link  |  

Muthusamy, S.K.T., 2013. A test case prioritization method with weight factors in regression testing based on measurement metrics. Int. J. Adv. Res. Comput. Sci. Software Eng., 3: 390-396.
Direct Link  |  

Narula, T. and G. Sharma, 2014. Framework for analyzing and testing cloud based applications. Int. J. Adv. Res. Comput. Sci. Software Eng., 4: 592-596.

Nguyen, C.D., A. Marchetto and P. Tonella, 2011. Test case prioritization for audit testing of evolving web services using information retrieval techniques. Proceedings of the 2011 IEEE International Conference on Web Services (ICWS), July 4-9, 2011, IEEE, Washington, DC., USA., ISBN: 978-1-4577-0842-8, pp: 636-643.

Nivethitha, S. and V.S. Sriram, 2013. Consolidating batch and transactional workloads using dependency structure prioritization. Int. J. Eng. Technol., 5: 128-1334.
Direct Link  |  

Ora, P. and P.R. Pal, 2015. Data security and integrity in cloud computing based on RSA partial homomorphic and MD5 cryptography. Proceedings of the 2015 International Conference on Computer, Communication and Control (IC4), September 10-12, 2015, IEEE, Indore, India, ISBN: 978-1-4799-8163-2, pp: 1-6.

Parthiban, D.T., M.R. Kamalraj and D.S. Karthik, 2014. Establishing a test case prioritization technique using dependency estimation of functional requirement. Int. J. Inn. Res. Sci. Eng. Technol., 3: 1526-1529.
Direct Link  |  

Rewagad, P. and Y. Pawar, 2013. Use of digital signature with Diffie Hellman key exchange and AES encryption algorithm to enhance data security in cloud computing. Proceedings of the 2013 International Conference on Communication Systems and Network Technologies (CSNT), April 6-8, 2013, IEEE, Gwalior, India, ISBN: 978-1-4673-5603-9, pp: 437-439.

Roongruangsuwan, S. and J. Daengdej, 2010. A test case prioritization method with practical weight factors. J. Software Eng., 4: 193-214.
CrossRef  |  Direct Link  |  

Solanki, K., Y. Singh and S. Dalal, 2015. Test case prioritization: An approach based on modified ant colony optimization (m-ACO). Proceedings of the 2015 International Conference on Computer, Communication and Control (IC4), September 10-12, 2015, IEEE, Indore, India, ISBN: 978-1-4799-8163-2, pp: 1-6.

Sood, S.K., 2012. A combined approach to ensure data security in cloud computing. J. Network Comput. Appl., 35: 1831-1838.
CrossRef  |  Direct Link  |  

Srikanth, H., C. Hettiarachchi and H. Do, 2016. Requirements based test prioritization using risk factors: An industrial study. Inf. Software Technol., 69: 71-83.
CrossRef  |  Direct Link  |  

Srivastava, K., R. Shah, D. Valia and H. Swaminarayan, 2013. Data mining using hierarchical agglomerative clustering algorithm in distributed cloud computing environment. Int. J. Comput. Theory Eng., 5: 520-522.
Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved