OFFLOADING THE CLIENT-SERVER TRE EFFORT FOR MINIMIZING CLOUD BANDWITH AND COST
|
|
- Osborn Goodman
- 8 years ago
- Views:
Transcription
1 OFFLOADING THE CLIENT-SERVER TRE EFFORT FOR MINIMIZING CLOUD BANDWITH AND COST Akshata B Korwar #1,Ashwini B Korwar #2,Sharanabasappa D Hannure #3 #1 Karnataka Kalburgi, , korwar9.aksha ta@ gmail.com. #2 Karnataka Kalburgi, , korw ar.ashwi ni@ gmail.com. #3 Karnataka Kalburgi, , dhsh mail.com. ABSTRACT Cloud-based TRE needs to apply a judicious use of cloud resources so that the bandwidth cost reduction combined with the additional cost of TRE computation and storage would be optimized. PACK main advantage is its ability to offload the cloudserver TRE effort to end users, thus minimizing the processing costs induced by the TRE algorithm. Unlike previous solutions, PACK does not require the server to continuously maintain clients status. This makes PACK very suitable for pervasive computation environments that combine client mobility and server migration to maintain cloud elasticity. The aim is to present a fully functional PACK implementation, transparent to all TCP-based applications and network devices by using its offloading capability to minimize the processing cost and increasing benefits for cloud users. INTRODUCTION Cloud system offers their clients to a low spending plan and convenient pay of service model, that is also called as usage based pricing [2], cloud customers (client) give money only for the cloud resources that they use [1], storage of information and bandwidth of usage, according to the customer changing needs, and make use of cloud adaptable and elastic computational capabilities. Traffic redundancy problem occur from natural customers exercises, for example, continuously or repeatedly accessing, download, upload disperse and change the same or different data things. The main work in this solution is, cloud owner has to upload the file in cloud server and each file may consume some bandwidth and cost, so the owner has to pay for that. When file is uploaded the chunk is matched internally and it shows remaining bandwidth and cost that will be allocated for other files. When receiver needs to download the file receiver give the file name and secrete key. If receiver given the different key, then he will be automatically blocked, because he is not authorized person. Here SHA-1 is used to give the security. If any redundant or duplicate chunks are founded means, the sender replaces the transmission of all each redundant chunk with its powerful signature. In typical TRE, arrangements are well known at this enterprise level systems or networks, and it include the use of three or more techniques, and it state synchronized middle-box at 2015 RS Publication, rspublicationhouse@gmail.com Page 73
2 two-level that is server exists in both points that is entry and exit point of branchoffices, (e.g.,cisco[6],riverbed[7],quantum[8]) removing the cyclic action among many clients. Within enterprise proprietary middle boxes are very popular points solution and but they are not so attractive in cloud environment. Moreover cloud customers can t profit by an innovation whose objective is to put resources into one. Increase of on interest "work spaces, meeting rooms, and telecommute plans [9] disconnect the specialists from their workplaces. In such a dynamic workplace, permanent end arrangements that need a serverside and client-side middle box solution become ineffective. Then again, cloud flexibility stimulates work allotment among servers and movement among server frames. Therefore it is generally arranged that software or product based End- TRE is critical in today s pervasive environment [10].This enables the make use of set of protocol stack and use of TRE within destination-to-destination secured traffic (e.g., SSL) conceivable. In this state where the cloud server is the sender and these arrangements need that the server consistently keeps up customer s status. In existing system cloud flexibility requires another new TRE solution. Initially, cloud weight controlling and power optimization may prompt a server-side procedure and information relocation environment, in which traffic redundancy elimination arrangements that need full synchronization between the server and the customer are difficult to achieve or may lose productivity because of lost synchronization. In second case, the status of rich media that devour high transfer speeds and prompts content distribution network (CDN) arrangements, in which the administration point for permanent and moveable clients may change with dynamically as per the relative administration point arrangements. If a destination-to-destination solution is utilized, it s extra computational and storage expense at the cloud side ought to be weighed against its bandwidth saving gains. In existing work security is not given, attacker can easily get modify the content of file, uploaded by the cloud owner. Clearly, TRE solutions that put vast majority of its computational exertion on the cloud side may swing to be less cost effective than the particular case that influences the joined customer side capabilities. Given a destination-to-destination solution found through some experiments that sender based destination-to-destination TRE solutions [4] add considerable load to the servers, which may eliminate the cloud cost savings tended to by the TRE in any case. In this system cloud flexibility requires another TRE arrangement that do not need the server to constantly keep up customer status. Each receiver-side watches the arriving stream and tries to match its chunk with a formally received chunk chain or chunk chain of local file using the extended word chunks metadata kept mainly, the receiver sends to the server prediction that in cloud chunk signature and easy to verify hints(part of chunk) of the sender future information. The sender initially checks the hint and performs the TRE action just on hint match. At the point when redundancy is recognized, the sender then sends to the receiver just the ACKs to the guess, as opposed to sending the information. Upon the clue match the sender starts the TRE operations, saving the clouds TRE computational exertion without activity repetition. On the client side, guidance a novel computationally lightweight chunking (fingerprinting) method termed as PACK chunking. PACK chunking is another option for Rabin fingerprinting effectively used by RE applications. Offloading the computational 2015 RS Publication, rspublicationhouse@gmail.com Page 74
3 exertion from the cloud to a huge set of customers structures a load allocation activity; every customer procedures just its traffic redundancy elimination part. SYSTEM ARCHITECTURE AND ALGORITHM The architecture of the system is presented in figure 1 Fig 1: System architecture The flow of data received at the PACK receiver is parsed to a sequence of variable size, content based signed chunks. The chunks are then compared to the receiver local storage, is called as chunk store. Receiver retrieves the sequence of subsequent chunks, if any matching chunk is found in local chunk store, by traversing the sequence of LRU chunk pointers present in the chunk metadata. The receiver sends a prediction to the sender for subsequent information using constructed chain. Part of each prediction chunk is called as a hint. The receiver prediction contains the range of the predicted data, the hint and the signature of the chunk. The sender then identifies the predicted range in its buffered data, and verifies the hint for that range. If the result matches the received hint, it continues to perform the more computationally intensive SHA-1 signature operation. Upon a signature match, the sender sends a confirmation message to the receiver, enabling it to copy the matched data from its local storage. Pack algorithm For the purpose of clarity, here first describe the essential beneficiary driven operation of the PACK convention. The pack receiver received the stream of data and parsed to a sequence of variable size and marked chunks similar to [3] and [5]. The pieces are then contrasted with the collector nearby capacity, termed chunk store. Utilizing the built chain, the beneficiary sends a form to the sender for the subsequent data. Part of each chunks expectation, termed a hint, is a simple to register capacity with a sufficiently little false positive worth, for example, the estimation of the last byte in the anticipated information or a extensive XOR checksum of all or chose bytes. The prediction sent by the recipient includes the extent of the anticipated information, the hint, and the chunk signature. The sender distinguishes the estimated accumulation in its cushioned information and checks the indication for that range. If that outcome coordinates the got indication, it keeps on performing the all the more computationally escalated SHA-1 mark operation. Upon the 2015 RS Publication, rspublicationhouse@gmail.com Page 75
4 chunk pieces are matched then sender sends confirmation message. Then the receiver gives the permission to copy the matched data from local storage. Receiver Algorithm Proc. 1: Recipient Segment Processing 1. in the event that section conveys payload information then 2. form piece 3. in the event that came to piece limit then 4. pass predattempt() 5. end if 6. else if PRED-ACK section then 7. processpredack() 8. pass predattempt() 9. end if Proc. 2: predattempt() 1. in the event that got piece coordinates one in chunk store then 2. in the event that foundchain(chunk) then 3. get ready PREDs 4. send single TCP ACK with PREDs as per Alternatives free space 5. exit 6. end if 7. else 8. store chunk 9. connection chunk to current chain 10. end if 11. send TCP ACK just Proc. 3: processpredack() 1. for all counterbalances PRED-ACK do 2. read information from chunk store 3. place information in TCP data buffer 4. end for 2015 RS Publication, Page 76
5 CONCLUSION The proposed work is carried out to reduce the cloud cost and bandwidth. Cloud provides its customer pay-as-you go service model, so the customer cannot benefit from the technology whose goal is to invest in one. In this work cloud bandwidth and cost is reduced by using chunk scheme, SHA-1 algorithm is used to give the security to cloud, where only authorized user can access the data or information from cloud. The work present in this system is only shown how the bandwidth and cost is reduced and one more enhancement is security is implemented. The future work will be combined to show how multi user can access the data without any conflicts. REFERENCES [1] E. Zohar, I. Cidon, and O. Mokryn, The power of prediction: Cloud bandwidth and cost reduction, in Proc. SIGCOMM, 2011, pp [2] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph,R.Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, A view of cloud computing, Commun. ACM, vol. 53, no. 4, pp , [3] U. Manber, Finding similar files in a large file system, in Proc. USENIX Winter Tech. Conf., 1994, pp [4] A. Muthitacharoen, B. Chen, and D. Mazières, A low-bandwidth network file system, in Proc. SOSP, 2001, pp [5] R. Williams, Method for partitioning a block of data into subblocks and for storing and communicating such subblocks, US Patent , Nov [6] Juniper Networks, Sunnyvale, CA, USA, Application acceleration, 1996 [Online]. Available: en/products-services/application-acceleration [7] Blue Coat Systems, Sunnyvale, CA, USA, MACH5, 1996 [Online]. Available: RS Publication, rspublicationhouse@gmail.com Page 77
6 [8] A. Anand, C. Muthukrishnan, A. Akella, and R. Ramjee, Redundancy in network traffic: Findings and implications, in Proc. SIGMETRICS, 2009, pp [9] M. Zink, K. Suh, Y. Gu, and J. Kurose, Watch global, cache local: YouTube network traffic at a campus network Measurements and implications, in Proc. MMCN, 2008, pp [10] S. Schleimer, D. S. Wilkerson, and A. Aiken, Winnowing: Local algorithms for document fingerprinting, in Proc. SIGMOD, 2003, pp RS Publication, rspublicationhouse@gmail.com Page 78
Department of CSE KMM institute of technology and Science Tirupati, Andhra Pradesh, India
Prediction Analysis Based Cloud Bandwidth and Cost Reduction N Silpa 1, V Harshavardhan 2, Dr K Venkataramana 3 1 M.Tech(CSE) Student, 2 Associate Professor, 3 Professor & HOD, Department of CSE KMM institute
More informationPrediction System for Reducing the Cloud Bandwidth and Cost
ISSN (e): 2250 3005 Vol, 04 Issue, 8 August 2014 International Journal of Computational Engineering Research (IJCER) Prediction System for Reducing the Cloud Bandwidth and Cost 1 G Bhuvaneswari, 2 Mr.
More informationA Novel Approach for Calculation Based Cloud Band Width and Cost Diminution Method
A Novel Approach for Calculation Based Cloud Band Width and Cost Diminution Method Radhika Chowdary G PG Scholar, M.Lavanya Assistant professor, P.Satish Reddy HOD, Abstract: In this paper, we present
More informationImprovement of Network Optimization and Cost Reduction in End To End Process Implementing in Clouds
Improvement of Network Optimization and Cost Reduction in End To End Process Implementing in Clouds A. Sree Valli 1, R. Chandrasekhar 2 PG Scholar, Department of C.S.E, KIET College, JNTUK A.P 1 Assistant
More informationPACK: PREDICTION-BASED CLOUD BANDWIDTH AND COST REDUCTION SYSTEM
PACK: PREDICTION-BASED CLOUD BANDWIDTH AND COST REDUCTION SYSTEM Abstract: In this paper, we present PACK (Predictive ACKs), a novel end-to-end traffic redundancy elimination (TRE) system, designed for
More informationPeriodically Predicting Client s Bandwidth & Cost Acknowledgements Sends to Cloud Server to Optimize Resource Usage
Periodically Predicting Client s Bandwidth & Cost Acknowledgements Sends to Cloud Server to Optimize Resource Usage 1 Prakash E J, 2 A.Nageswara Rao 1 M.Tech Student, Department of Computer Science and
More informationEnhanced PACK Approach for Traffic Redundancy Elimination
Enhanced PACK Approach for Traffic Redundancy Elimination Eldho Skaria 1, George T Vadakkumcheril 2 1,2 Department of Computer Science and Engineering, KMP College of Engineering, Asamannoor P.O Poomala,
More informationPREDICTION BASED CLOUD BANDWIDTHAND COSTREDUCTION SYSTEMOFCLOUD COMPUTING
PREDICTION BASED CLOUD BANDWIDTHAND COSTREDUCTION SYSTEMOFCLOUD COMPUTING A.Rasik and S. Raj Anand VelTechMultiTech Dr. Rangarajan Dr. Sakunthala Engineering College, Chennai ABSTRACT In this paper, we
More informationAN EFFECTIVE WAY FOR COST REDUCTION OF CLOUD BANDWIDTH BASED ON PREDICTION
AN EFFECTIVE WAY FOR COST REDUCTION OF CLOUD BANDWIDTH BASED ON PREDICTION 1 T.BHARGAVI, 2 Dr. P. VENKATESWARLU, 3 B.V. SRIKANTH 1 M.Tech (CSE) student, Department of Computer Science & Engineering Nagole
More informationIEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 22, NO. 1, FEBRUARY 2014 39. PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 22, NO. 1, FEBRUARY 2014 39 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System Eyal Zohar, Israel Cidon, and Osnat Mokryn Abstract In this paper,
More informationDistributed Management for Load Balancing in Prediction-Based Cloud
Distributed Management for Load Balancing in Prediction-Based Cloud T.Vijayakumar 1, Dr. D. Chitra 2 P.G. Student, Department of Computer Engineering, P.A. College of, Pollachi, Tamilnadu, India 1 Professor
More informationThe Power of Prediction: Cloud Bandwidth and Cost Reduction
The Power of Prediction: Cloud Bandwidth and Cost Reduction Eyal Zohar Technion - Israel Institute of Technology eyalzo@tx.technion.ac.il Israel Cidon Technion - Israel Institute of Technology cidon@ee.technion.ac.il
More informationMulti-level Metadata Management Scheme for Cloud Storage System
, pp.231-240 http://dx.doi.org/10.14257/ijmue.2014.9.1.22 Multi-level Metadata Management Scheme for Cloud Storage System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3, Chuck Yoo 2 and Young Woong Ko 1
More informationCisco WAAS 4.4.1 Context-Aware DRE, the Adaptive Cache Architecture
White Paper Cisco WAAS 4.4.1 Context-Aware DRE, the Adaptive Cache Architecture What You Will Learn Enterprises face numerous challenges in the delivery of applications and critical business data to the
More informationA Survey on Aware of Local-Global Cloud Backup Storage for Personal Purpose
A Survey on Aware of Local-Global Cloud Backup Storage for Personal Purpose Abhirupa Chatterjee 1, Divya. R. Krishnan 2, P. Kalamani 3 1,2 UG Scholar, Sri Sairam College Of Engineering, Bangalore. India
More informationData Integrity for Secure Dynamic Cloud Storage System Using TPA
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure
More informationAN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT Mohd Abdul Shoaib 1, Akheel Mohammed 2, Ayesha 3
More informationOn the Performance of Redundant Traffic Elimination in WLANs
On the Performance of Redundant Traffic Elimination in WLANs Emir Halepovic, Majid Ghaderi and Carey Williamson Department of Computer Science University of Calgary, Calgary, AB, Canada Email: {emirh,
More informationA TECHNICAL REVIEW OF CACHING TECHNOLOGIES
WHITEPAPER Over the past 10 years, the use of applications to enable business processes has evolved drastically. What was once a nice-to-have is now a mainstream staple that exists at the core of business,
More informationLive Streaming with CCN & Content Transmission with CCNx
Live Streaming with CCN & Content Transmission with CCNx 21 Jun. 2012 Suphakit Awiphan Katto Laboratory, Waseda University Outline Introduces the paper entitled Live Streaming with Content Centric Networking
More informationIndex Terms : Load rebalance, distributed file systems, clouds, movement cost, load imbalance, chunk.
Load Rebalancing for Distributed File Systems in Clouds. Smita Salunkhe, S. S. Sannakki Department of Computer Science and Engineering KLS Gogte Institute of Technology, Belgaum, Karnataka, India Affiliated
More informationHTTP-Level Deduplication with HTML5
HTTP-Level Deduplication with HTML5 Franziska Roesner and Ivayla Dermendjieva Networks Class Project, Spring 2010 Abstract In this project, we examine HTTP-level duplication. We first report on our initial
More informationTransport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
More informationSECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering
More informationA Deduplication-based Data Archiving System
2012 International Conference on Image, Vision and Computing (ICIVC 2012) IPCSIT vol. 50 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V50.20 A Deduplication-based Data Archiving System
More informationThe assignment of chunk size according to the target data characteristics in deduplication backup system
The assignment of chunk size according to the target data characteristics in deduplication backup system Mikito Ogata Norihisa Komoda Hitachi Information and Telecommunication Engineering, Ltd. 781 Sakai,
More informationTHE CLOUD AND ITS EFFECTS ON WEB DEVELOPMENT
TREX WORKSHOP 2013 THE CLOUD AND ITS EFFECTS ON WEB DEVELOPMENT Jukka Tupamäki, Relevantum Oy Software Specialist, MSc in Software Engineering (TUT) tupamaki@gmail.com / @tukkajukka 30.10.2013 1 e arrival
More informationData Deduplication Scheme for Cloud Storage
26 Data Deduplication Scheme for Cloud Storage 1 Iuon-Chang Lin and 2 Po-Ching Chien Abstract Nowadays, the utilization of storage capacity becomes an important issue in cloud storage. In this paper, we
More informationDe-duplication-based Archival Storage System
De-duplication-based Archival Storage System Than Than Sint Abstract This paper presents the disk-based backup system in which only relational database files are stored by using data deduplication technology.
More informationOn the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu
On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu Dilip Kumar Krishnappa, Samamon Khemmarat, Lixin Gao, Michael Zink University of Massachusetts Amherst,
More informationA First Look at Mobile Cloud Storage Services: Architecture, Experimentation and Challenge
A First Look at Mobile Cloud Storage Services: Architecture, Experimentation and Challenge Yong Cui Tsinghua University Zeqi Lai Tsinghua University Ningwei Dai Tsinghua University Abstract Mobile cloud
More informationFault-Tolerant Framework for Load Balancing System
Fault-Tolerant Framework for Load Balancing System Y. K. LIU, L.M. CHENG, L.L.CHENG Department of Electronic Engineering City University of Hong Kong Tat Chee Avenue, Kowloon, Hong Kong SAR HONG KONG Abstract:
More informationImproving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
More informationMODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT
MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT Soumya V L 1 and Anirban Basu 2 1 Dept of CSE, East Point College of Engineering & Technology, Bangalore, Karnataka, India
More informationEFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
More informationCelleration: Loss-Resilient Traffic Redundancy Elimination for Cellular Data
Celleration: Loss-Resilient Traffic Redundancy Elimination for Cellular Data Eyal Zohar Electrical Engineering Technion Haifa, Israel eyalzo@tx.technion.ac.il Israel Cidon Electrical Engineering Technion
More informationSECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK
International Journal of Advance Research In Science And Engineering IJARSE, Vol. No.4, Issue No.01, January 2015 http:// SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK Arudra Gopala Rao
More informationA Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments
A Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments Faraz Fatemi Moghaddam (f.fatemi@ieee.org) Omidreza Karimi (omid@medicatak.com.my) Dr. Ma en T. Alrashdan (dr.maen@apu.edu.my)
More informationPrivacy Preservation and Secure Data Sharing in Cloud Storage
OPEN ACCESS Int. Res. J. of Science & Engineering, 2015; Vol. 3 (6): 231-236 ISSN: 2322-0015 RESEARCH ARTICLE Privacy Preservation and Secure Data Sharing in Cloud Storage Chavhan Bhaurao* and Deshmukh
More informationUsing UDP Packets to Detect P2P File Sharing
188 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 27 Using UDP Packets to Detect P2P File Sharing Tsang-Long Pao and Jian-Bo Chen Tatung University, Taipei,
More informationA Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique
A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique Jyoti Malhotra 1,Priya Ghyare 2 Associate Professor, Dept. of Information Technology, MIT College of
More informationA Survey Paper on Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud
A Survey Paper on Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud Aishwarya R. Kumthekar 1, Prof. Jyoti Raghatwan 2 1 M.E. II Computer, aish275@gmail.com, 8806967523
More informationThe Algorithm of Sharing Incomplete Data in Decentralized P2P
IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 2007 149 The Algorithm of Sharing Incomplete Data in Decentralized P2P Jin-Wook Seo, Dong-Kyun Kim, Hyun-Chul Kim,
More informationPeer-to-peer Cooperative Backup System
Peer-to-peer Cooperative Backup System Sameh Elnikety Mark Lillibridge Mike Burrows Rice University Compaq SRC Microsoft Research Abstract This paper presents the design and implementation of a novel backup
More informationIndex Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving
More informationHierarchical Content Routing in Large-Scale Multimedia Content Delivery Network
Hierarchical Content Routing in Large-Scale Multimedia Content Delivery Network Jian Ni, Danny H. K. Tsang, Ivan S. H. Yeung, Xiaojun Hei Department of Electrical & Electronic Engineering Hong Kong University
More informationIMPLEMENTATION OF SOURCE DEDUPLICATION FOR CLOUD BACKUP SERVICES BY EXPLOITING APPLICATION AWARENESS
IMPLEMENTATION OF SOURCE DEDUPLICATION FOR CLOUD BACKUP SERVICES BY EXPLOITING APPLICATION AWARENESS Nehal Markandeya 1, Sandip Khillare 2, Rekha Bagate 3, Sayali Badave 4 Vaishali Barkade 5 12 3 4 5 (Department
More informationIMPROVING QUALITY OF VIDEOS IN VIDEO STREAMING USING FRAMEWORK IN THE CLOUD
IMPROVING QUALITY OF VIDEOS IN VIDEO STREAMING USING FRAMEWORK IN THE CLOUD R.Dhanya 1, Mr. G.R.Anantha Raman 2 1. Department of Computer Science and Engineering, Adhiyamaan college of Engineering(Hosur).
More informationA Network Control Plane for Massive Video Delivery
A Network Control Plane for Massive Video Delivery Giuseppe Cofano Politecnico di Bari, Dipartimento di Ingegneria Elettrica e dell Informazione, Via E. Orabona 4 70125 Bari, Italy - giuseppe.cofano@poliba.it
More informationTITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper)
TITLE: Secure Auditing and Deduplicating Data in Cloud(Survey Paper) Pratik Raut 1, Pratik Kamble 2, Prafull Pansare 3, Dipti Salunkhe 4 1 UG Student, Dept. of Computer Engineering, JSCOE, Hadapsar, Pune,
More informationSECURITY THREATS TO CLOUD COMPUTING
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 3, Mar 2014, 101-106 Impact Journals SECURITY THREATS TO CLOUD
More informationQuanqing XU Quanqing.Xu@nicta.com.au. YuruBackup: A Highly Scalable and Space-Efficient Incremental Backup System in the Cloud
Quanqing XU Quanqing.Xu@nicta.com.au YuruBackup: A Highly Scalable and Space-Efficient Incremental Backup System in the Cloud Outline Motivation YuruBackup s Architecture Backup Client File Scan, Data
More informationIndex Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.
Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune ghatkar.abhaya@gmail.com, jadhavreena70@yahoo.com, renjug03@gmail.com,
More informationAn Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
More informationSheltered Multi-Owner Data distribution For vibrant Groups in the Cloud
Sheltered Multi-Owner Data distribution For vibrant Groups in the Cloud I.sriram murthy 1 N.Jagajeevan 2 II M-Tech student Assistant.Professor Department of computer science & Engineering Department of
More informationOverview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
More informationPer-Flow Queuing Allot's Approach to Bandwidth Management
White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth
More informationA Hybrid Load Balancing Policy underlying Cloud Computing Environment
A Hybrid Load Balancing Policy underlying Cloud Computing Environment S.C. WANG, S.C. TSENG, S.S. WANG*, K.Q. YAN* Chaoyang University of Technology 168, Jifeng E. Rd., Wufeng District, Taichung 41349
More informationPSM-throttling: Minimizing Energy Consumption for Bulk Data Communications in WLANs
PSM-throttling: Minimizing Energy Consumption for Bulk Data Communications in WLANs Xiaodong Zhang Ohio State University in Collaborations with Enhua Tan, Ohio State Lei Guo, Yahoo! Songqing Chen, George
More informationCLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES
CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES 1 MYOUNGJIN KIM, 2 CUI YUN, 3 SEUNGHO HAN, 4 HANKU LEE 1,2,3,4 Department of Internet & Multimedia Engineering,
More informationSECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE
SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE 1 PARISHA TYAGI, 2 VIRENDRA KUMAR 1Department of Information Technology, Suresh Gyan Vihar University, Rajasthan, India 2 Department of
More informationTHe exponential growth of mobile data traffic has led
1 Chunk and Object Level Deduplication for Web Optimization: A Hybrid Approach Ioannis Papapanagiotou, Student Member, IEEE, Robert D. Callaway, Member, IEEE, and Michael Devetsikiotis, Fellow, IEEE Abstract
More informationIMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION N.Vijaya Sunder Sagar 1, M.Dileep Kumar 2, M.Nagesh 3, Lunavath Gandhi
More informationSecurity related to the information designing or even media editing. This enables users
A Potential Cloud Service by Auditing Cloud MalaimariSuganya.P 1, Padma Priya.R 2 1 Department of Computer Science and Information Technology Nadar Saraswathi College of Arts and Science, Theni dt-625531,
More informationData Integrity Check using Hash Functions in Cloud environment
Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology
More informationSecrecy Maintaining Public Inspecting For Secure Cloud Storage
Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan
More informationIDENTIFYING AND OPTIMIZING DATA DUPLICATION BY EFFICIENT MEMORY ALLOCATION IN REPOSITORY BY SINGLE INSTANCE STORAGE
IDENTIFYING AND OPTIMIZING DATA DUPLICATION BY EFFICIENT MEMORY ALLOCATION IN REPOSITORY BY SINGLE INSTANCE STORAGE 1 M.PRADEEP RAJA, 2 R.C SANTHOSH KUMAR, 3 P.KIRUTHIGA, 4 V. LOGESHWARI 1,2,3 Student,
More informationComparative Traffic Analysis Study of Popular Applications
Comparative Traffic Analysis Study of Popular Applications Zoltán Móczár and Sándor Molnár High Speed Networks Laboratory Dept. of Telecommunications and Media Informatics Budapest Univ. of Technology
More informationAN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD Koncha Anantha Laxmi Prasad 1, M.Yaseen Pasha 2, V.Hari Prasad 3 1
More informationDELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.
More informationINVESTIGATION OF RENDERING AND STREAMING VIDEO CONTENT OVER CLOUD USING VIDEO EMULATOR FOR ENHANCED USER EXPERIENCE
INVESTIGATION OF RENDERING AND STREAMING VIDEO CONTENT OVER CLOUD USING VIDEO EMULATOR FOR ENHANCED USER EXPERIENCE Ankur Saraf * Computer Science Engineering, MIST College, Indore, MP, India ankursaraf007@gmail.com
More informationThe Hidden Extras. The Pricing Scheme of Cloud Computing. Stephane Rufer
The Hidden Extras The Pricing Scheme of Cloud Computing Stephane Rufer Cloud Computing Hype Cycle Definition Types Architecture Deployment Pricing/Charging in IT Economics of Cloud Computing Pricing Schemes
More informationDevelopment Model and Environment for Dynamic Mobile Cloud Services
Development Model and Environment for Dynamic Mobile Cloud Services Kuo-chu Wu Department of Computer Science and Information Engineering National Dong Hwa University Hualien, Taiwan, ROC Email:wukauzun@gmail.com
More informationHow To Write A Blog Post On Dropbox
Inside Dropbox: Understanding Personal Cloud Storage Services Idilio Drago Marco Mellia Maurizio M. Munafò Anna Sperotto Ramin Sadre Aiko Pras IMC 2012 Boston Motivation and goals 1/14 Personal cloud storage
More informationA Comparative Study of cloud and mcloud Computing
A Comparative Study of cloud and mcloud Computing Ms.S.Gowri* Ms.S.Latha* Ms.A.Nirmala Devi* * Department of Computer Science, K.S.Rangasamy College of Arts and Science, Tiruchengode. s.gowri@ksrcas.edu
More informationOverview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
More informationData Security Using Reliable Re-Encryption in Unreliable Cloud
ISSN (Online): 2277-5420 www.ijcsn.org Data Security Using Reliable Re-Encryption in Unreliable Cloud 328 1 Ajinkya Adhau, 2 Payal Bobade, 3 Priyanka Zilpe, 4 Yashodhara Fulmali 1, 2, 3, 4 Student, Department
More informationA Data De-duplication Access Framework for Solid State Drives
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 28, 941-954 (2012) A Data De-duplication Access Framework for Solid State Drives Department of Electronic Engineering National Taiwan University of Science
More informationCloud Based E-Learning Platform Using Dynamic Chunk Size
Cloud Based E-Learning Platform Using Dynamic Chunk Size Dinoop M.S #1, Durga.S*2 PG Scholar, Karunya University Assistant Professor, Karunya University Abstract: E-learning is a tool which has the potential
More informationAn Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.730
More informationA Review of Load Balancing Algorithms for Cloud Computing
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -9 September, 2014 Page No. 8297-8302 A Review of Load Balancing Algorithms for Cloud Computing Dr.G.N.K.Sureshbabu
More informationWindows Web Based VPN Connectivity Details & Instructions
VPN Client Overview UMDNJ s Web based VPN utilizes an SSL (Secure Socket Layer) Based Cisco Application that provides VPN functionality without having to install a full client for end users running Microsoft
More informationEnable Public Audit ability for Secure Cloud Storage
Enable Public Audit ability for Secure Cloud Storage Leela Poornima 1, D.Hari Krishna 2 1 Student, Nova College of Engineering and Technology, Ibrahimpatnam,Krishna Dist., Andhra Pradesh, India 2 Assistant
More informationNote! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
More informationCisco Application Networking for Citrix Presentation Server
Cisco Application Networking for Citrix Presentation Server Faster Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
More informationA Novel Framework for Improving Bandwidth Utilization for VBR Video Delivery over Wide-Area Networks
A Novel Framework for Improving Bandwidth Utilization for VBR Video Delivery over Wide-Area Networks Junli Yuan *, Sujoy Roy, Qibin Sun Institute for Infocomm Research (I 2 R), 21 Heng Mui Keng Terrace,
More informationHIGH-SPEED BRIDGE TO CLOUD STORAGE
HIGH-SPEED BRIDGE TO CLOUD STORAGE Addressing throughput bottlenecks with Signiant s SkyDrop 2 The heart of the Internet is a pulsing movement of data circulating among billions of devices worldwide between
More informationFinal exam review, Fall 2005 FSU (CIS-5357) Network Security
Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection
More informationSECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE
International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------
More informationChapter 3. Internet Applications and Network Programming
Chapter 3 Internet Applications and Network Programming 1 Introduction The Internet offers users a rich diversity of services none of the services is part of the underlying communication infrastructure
More informationInside Dropbox: Understanding Personal Cloud Storage Services
Inside Dropbox: Understanding Personal Cloud Storage Services Corneliu Claudiu Prodescu School of Engineering and Sciences Jacobs University Bremen Campus Ring 1, 28759 Bremen, Germany Monday 22 nd April,
More informationCloud Based Instructional Resources for Distance Learning
Cloud Based Instructional Resources for Distance Learning Noah Sturdevant Stamford International University Bangkok, Thailand Abstract Technology has advanced sufficiently, especially in the area of communication,
More informationCLOUD BASED HOME SECURITY 1 Anjali Chachra 1
CLOUD BASED HOME SECURITY 1 Anjali Chachra 1 Computer Science, KJ Somaiya college of engineering Email: 1 chachraanjali@yahoo.co.in Abstract This report deals with the design and implementation of a Home
More informationThe Effect of Packet Loss on Redundancy Elimination in Cellular Wireless Networks
The Effect of Packet Loss on Redundancy Elimination in Cellular Wireless Networks Cristian Lumezanu Georgia Tech lume@cc.gatech.edu Katherine Guo Alcatel-Lucent Bell Laboratories kguo@bell-labs.com Bobby
More informationFAST 11. Yongseok Oh <ysoh@uos.ac.kr> University of Seoul. Mobile Embedded System Laboratory
CAFTL: A Content-Aware Flash Translation Layer Enhancing the Lifespan of flash Memory based Solid State Drives FAST 11 Yongseok Oh University of Seoul Mobile Embedded System Laboratory
More informationThe Evolution of Application Acceleration:
WHITE PAPER The Evolution of Application Acceleration: From Server Load Balancers to Application Delivery Controllers www.crescendonetworks.com Corporate Headquarters 6 Yoni Netanyahu Street Or-Yehuda
More informationAn Architecture to Manage Performance and Reliability on Hybrid Cloud-Based Firewalling
An Architecture to Manage Performance and Reliability on Hybrid Cloud-Based Firewalling Fouad Guenane, Hajer Boujezza, Michele Nogueira, Guy Pujolle Sorbonne Universities, UPMC Univ Paris 6, UMR 766, LIP6,
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK IMPLEMENTATION OF AN APPROACH TO ENHANCE QOS AND QOE BY MIGRATING SERVICES IN CLOUD
More informationInternational Journal of Advancements in Research & Technology, Volume 3, Issue 8, August-2014 68 ISSN 2278-7763
International Journal of Advancements in Research & Technology, Volume 3, Issue 8, August-2014 68 A Survey of Load Balancing Algorithms using VM B.KalaiSelvi 1 and Dr.L.Mary Immaculate Sheela 2 1 Research
More information