Client Trust and Prioritization based Workflow Scheduling in Cloud
|
|
|
- Archibald Ray
- 10 years ago
- Views:
Transcription
1 Client Trust and Prioritization based Workflow Scheduling in Cloud NeerajKumari Khairwal #1, Deven Shah *2 # Information Technology,Terna Engineering College, Mumbai University,Nerul,Navi Mumbai, India 1 [email protected] 2 [email protected] Abstract Trust management is an important component of cloud security. Many trust mechanisms have been proposed to address user/client concern related to security, accountability, reliability and privacy. These methods focus on evaluating cloud services and vendors to ensure client s trust on the service provided. But, insider attacks also pose a significant challenge to enterprise security. According to Cloud Security Alliance, data breaches and cloud service abuse rank among the greatest cloud security threats. To mitigate such security risks, trust being a two-way street, there s a need for Cloud Service Provider (CSP) to have trusted clients. In this paper, Client Trust and Prioritization based WorkFlow Scheduling (CTP-WFS) model is proposed to prioritize and provide guaranteed service to trusted customers. Both old and new customers would have better usability experience. This approach implicitly avoids Denial of Service attacks. CTP-WFS will boost long term revenue generation while avoiding some security attacks. Keywords Workflow Scheduling, Client Trust, Prioritization, Fuzzy Sets, Cloud Computing. I. INTRODUCTION Cloud computing is the latest buzz in the computer world. It s evolving like never before, with companies of all shapes and sizes adapting to this new technology. Industry experts believe that this trend will only continue to grow and develop even further in the coming few years. Cloud is a cloud of resources over internet that can be accessed by end users anywhere, anytime. Resources in cloud are virtually infinite that are aggregated to be shared. These resources can be in the form of hardware, software, infrastructure, storage and so on. Cloud provides multi-tenancy of these virtualized resources. Users can pay as per their flexible needs. Cloud allows on-demand services with massive processing power and high elasticity that reduces capital expenditure and maintenance cost. Typically, three service models are offered by cloud: Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). Depending on business requirements, cloud can be implemented as Private Cloud, Public Cloud, Community Cloud or Hybrid Cloud. Cloud has found wide applications in business, social networks, industries, government and science. It is a promising technique for integration of enterprise systems. It allows business enterprises to reduce capital cost, streamline processes, globalize workforce, improve accessibility and increase collaboration. These benefits have led to rapid growth of cloud and its challenges. Large number of requests generated should be managed efficiently to improve customer satisfaction. Cloud s emergence has led to new risks that clients should consider while evaluating cloud services and vendors. Security has always been top concern for cloud adoption. Strategies are developed to understand risks and protect data on cloud. But, cloud security is more than just physical controls. People, processes, policies and products are the key aspects of cloud security. The need for trust arises as an important factor especially in vital data and transaction processing applications. Moving to cloud is not restricted to purchasing a specific product or service. Rather it s like a partnership between the client and the CSP. Both client and vendor must commit to communication and transparency. This would help deal complex problems with ease and maximize the potential for client success. Cloud model helps break complex problems into services that can be integrated to provide secure and scalable solution. These services are represented in the form of orchestrated business activity patterns called workflows. Workflows help automating business processes, to ease out the complexity of task execution and management. Since, workflow requests sometimes exceed resource availability, scheduling comes into picture. Scheduling, systematically organizes resources to serve composite services. Workflow scheduling is used to assign best possible cloud service for workflow tasks. It aims to make the most of cloud services and meet user QoS requirements. Any algorithm which is proposed for scheduling of large scale resources is NP-hard problem. In this paper, scheduling strategy is proposed to optimize time, profit and client trust factor. Client requests are prioritized based on these metrics. To achieve this, workflow planning problem is modeled as a multi-objective optimization problem. In this approach, groups of conflicting objectives are simultaneously optimized. This paper is an effort to balance different conflicting requirements of enterprises as well as to endow esteemed customers with prompt services by developing CTP-WFS model. Usability experience of all customer groups would be improved explicitly through CTP-WFS and implicitly by preventing loss and service disruption due to Denial of Service attack.
2 II. RELATED WORK Economic globalization and increasing competition has procreated the need for system integration. As a result, many large enterprises opt for integration of various enterprise systems [1,2]. Cloud computing provides collaborative environment with large pool of cloud services. But heterogeneous problems in data formats, structures and semantics pose a challenge for smooth collaborative business process [3-5]. Integrating cloud services into a composite service can be facilitated by workflows. Workflows are used for automation of business process in large-scale distributed systems. Workflows help to execute and manage complex business process smoothly [6,7]. The workflows can be depicted as a series of multiple tasks that simplify the coordinated execution process. The process of allocating workflow tasks to most appropriate cloud service is referred to as Workflow Scheduling. Workflow scheduling algorithms strive to generate approximate or near-optimal solutions as WFS being NP-hard problem, it is impossible to produce an optimal solution in polynomial time. Several scheduling algorithms have been developed to meet the complicated need of organizational practices but most of them focus on minimizing execution time and cost. Large-scale distributed systems have inherent uncertainty and unreliability. Moreover, cloud computing environment mostly consist of geographically distributed and assorted service providers. To avoid failure-prone network, trust factor comes into picture. Trust is an integral and essential part of enterprise business as it influences decision support and helps analyzing current trend. Generally, customers get the opportunity to rate the CSPs and provide feedback where feedback rate can be calculated as R = P / (P+N), where P is the number of positive rating and N is the number of negative ratings. Another mechanism referred as PowerTrust Model can be used to rate trust factor where trust value is based on the feedback of successful transactions. Kamvar et al [8] proposed a distributed and secure method, named the EigenTrust algorithm, to compute global trust value. In this, a binary rating model was used to evaluate local successful transaction from each peer. [9] suggests a bi-objective WFS algorithm that aims to minimize makespan time while maximizing reliability on heterogeneous systems. Recommendation Systems [10,11] use collaborative filtering model to facilitate service selection. Trust WorkFlow Scheduling (TWFS) algorithm combines direct trust with recommended trust to compute trust metric and then uses multiobjective model to optimize the group of conflicting objectives (time, cost and trust) simultaneously [12]. The aforementioned solutions provide a valuable insight into the challenges and potential of trust-based solutions for WFS. In this paper, reverse trust based elucidation is proposed where CSP rates the customer based on the predefined metrics. This trust factor is then used to prioritize client request to improve customer satisfaction. III. PROPOSED MECHANSIM In this section, CTP-WFS model is proposed that looks at workflow scheduling from CSP perspective. WFS problem is treated as a fuzzy multi-objective problem which is subject to time, profit and trust constraints. A. CTP-WFS Model Client is at the heart of business relationships. It is a key to maintaining old customers and gaining new ones. Customer s buying decisions are driven by the trust on the CSP. Given today s highly competitive scenario, it s equally important for CSP s to have trusted customers. A mechanism to efficiently handle requests from all user groups both old and new is proposed as shown in figure 1: Fig. 1 CTPWFS Flowchart
3 Algorithm-1. Pseudo code for CTPWFS algorithm Input: Set of client requests Output: Customer Mode of each client Functions: setcustomermode() { 1. If (cust_freq <= new_cust_freq) { 2. Set Customer Mode as Privilege 3. } 4. Else If (cust_freq <= freq_threshold) { 5. If (cust_pay_mode == prepaid) { 6. Set Customer Mode as Privilege 7. } 8. Else If (cust_pay_record >= pay_threshold) { 9. Set Customer Mode as Privilege 10. } 11. Else Set Customer Mode as Normal 12. } 13. Else If (rev_gen <= rev_threshold) { 14. Set Customer Mode as Normal 15. } 16. Else If (cust_pay_mode == prepaid) { 17. Set Customer Mode as Privilege 18. } 19. Else If (cust_pay_record >= pay_threshold) { 20. Set Customer Mode as Privilege 21. } 22. Else Set Customer Mode as Normal 23. } New customers are attracted by providing guaranteed service whereas old customers are retained, who have decreased access frequency in past few months, by treating them as new customer and confidence is regained. Genuine customers are identified and prioritized based on criteria such as frequency of access, revenue generated and payment record. Overall, this would lead to improve usability experience, increase total number of customers and subsequently boost long term revenue generation. B. Fuzzy Model Using max-min operator, the membership function of objectives is formulated by separating every objective into its maximum and minimum values. 1) Membership Function for Trust Evaluation A general client-trust metric combines frequency of requests, revenue generated and payment record. Based on comparison with set thresholds for above listed parameters, customer_mode is set to be privilege or normal and trust factor is set accordingly. Using Max-min operator, the membership function for clienttrust is formulated as below: U Ri (ct x ) = ct i x-ct i min, if ct i min <= ct i x <= ct i max ct i max-ct i min U Ri (ct x ) = 0, if ct i min <= ct i x U Ri (ct x ) = 1, if ct i max <= ct i x A value of trust ct i close to maximum trust ct max indicates that the client is an esteemed customer and hence, his request should be prioritized. 2) Membership Function for Response Time There is a set of requests R from clients that would need different processing times PT x depending upon length of client request in MI (Million Instructions), virtual machine processing speed in MIPS (Million Instructions Per Second). Based upon nature of client request, data transfer time DTT x would be considered. If a new VM is to be initiated, even VM initiation time IT x will be taken into account. All these three parameters will constitute the Total Response time T x. T x = PT x + DTT x, T x = PT x + DTT x + IT x, if new VM is not initiated if new VM is initiated And the list of requests will be sorted in an ascending way based on the value of time. Max-min operator is used to formulate the membership function for time. U Ri (t x ) = t i max-t i x, if t i min <= t i x <= t i max t i max-t i min U Ri (t x ) = 0, if t i max <= t i x U Ri (t x ) = 1, if t i min <= t i x Closer the value of time t i is to minimum time t min, lesser the response time is and the more the objective is satisfied. 3) Membership Function for Profit Let a client submit new request at submission time with maximum price B x to CSP. Let the total cost incurred by CSP be represented by C x. Processing cost PC x and data transfer cost DTC x along with VM initiation cost IC x constitute for total cost C x. C x = PC x + DTC x + IC x The profit gained by CSP is defined as difference between budget and total cost. P x = B x - C x Similar to the membership function to trust evaluation, the membership function for the profit of the ith request can be defined using max-min operator. U Ri (p x ) = p i x-p i min, if p i min <= p i x <= p i max p i max-p i min U Ri (p x ) = 0, if p i max <= p i x U Ri (p x ) = 1, if p i min <= p i x Low value of profit p i signifies that the membership value is low. Higher the value of p i better is the profit earned and more the objective is achieved. The list of requests is stored in descending order based on profit.
4 4) WFS Model The workflow planning problem is a multi-objective optimization problem in which groups of conflicting objectives are simultaneously optimized. WFS require policies to strike a balance for the different requirements. The optimization of the workflow is to prioritize genuine requests R i in order to achieve minimum execution time and maximum profit while meeting the constraints of client-trust. In order to satisfy the multiple criteria simultaneously, a compromise should be made to find a suitable solution. Using max-min operator, the aforementioned fuzzy model can be converted into crisp model. The degree of overall satisfaction is the minimum of all membership values. The fuzzy decision may be considered as the choice that satisfies all of the objectives. λ i j = min { U Ri (ct x ), U Ri (t x ), U Ri (p x )} The selection of services for WFS is the maximum of all degrees of satisfaction. λ i k = max { λ i j } To consider the relative importance of objectives, the selection model can be formulated by the weighted arithmetic mean operator. Maximize U*W T w ct + w c + w p = 1, for w ct, w p, w t ϵ [0,1] where W is the weight vector containing w ct, w c, w t, w ct means the weight of client trust, w p means the weight profit, w t means the weight of response time. REFERENCES [1] L. Xu, Enterprise systems: State-of-the-art and future trends, IEEE Trans. Ind. Informat., vol. 7, no. 4, pp , Nov [2] J. Guo, L. Xu, Z. Gong, C. Che, and S. Chaudhry, Semantic inference on heterogeneous e-marketplace activities, IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol. 42, no. 2, pp , Mar [3] M. Dikaiakos, D. Katsaros, P. Mehra, G. Pallis, and A. Vakali, Cloud computing: Distributed internet computing for IT and scientific research, IEEE Internet Comput., vol. 13, no. 5, pp , Sep./Oct [4] R.. Mietzner, F. Leymann, and T. Unger, Horizontal and vertical combination of multi-tenancy patterns in service-oriented applications, Enterprise Inf. Syst., vol. 5, no. 1, pp , Feb [5] M.. Tan, Y. Xu, W. Xu, L. Xu, X. Zhao, L. Wang, and L. Fu, A methodology toward manufacturing grid-based virtual enterprise operation platform, Enterprise Inf. Syst., vol. 4, no. 3, pp , Aug R. E. Sorace, V. S. Reinhardt, and S. A. Vaughn, High-speed digital- to-rf converter, U.S. Patent , Sept. 16, [6] N.. Ranaldo and E. Zimeo, Time and cost-driven scheduling of data parallel tasks in grid workflows, IEEE Syst. J., vol. 3, no. 1, pp , Mar [7] J. Ma, K. Wang, and L. Xu, Modelling and analysis of workflow for lean supply chains, Enterprise Inf. Syst., vol. 5, no. 4, pp , Nov [8] S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, The eigentrust algorithm for reputation management in P2P networks, in Proc. Int. Conf. WWW, 2003, pp [9] L. Duan, W. Street, and E. Xu, Healthcare information systems: Data mining methods in the creation of a clinical recommender system, Enterprise Inf. Syst., vol. 5, no. 2, pp , May [10] R. Sakellariou, H. Zhao, E. Tsiakkouri, andm. D. Dikaiakos, Scheduling workflows with budget constraints, in Proc. Workshop Integr. Res. Grid Comput., Pisa, Italy, 2005, pp [11] J. Yu and R. Buyya, A taxonomy of workflow management systems for grid computing, J. Grid Comput., vol. 33, no. 3/4, pp , Sep [12] W.Tan, Y. Sun, L. Li, G. Lu and T. Wong, A Trust Service- Oriented Scheduling Model Workflow Applications in Cloud Computing, IEEE SYSTEM JOURNAL, VOL.8 NO.3 Sep 2014 Thus, weight factors will help the model to be flexible and can be used to evaluate significance of each parameter to maximize revenue and build good client relationships. IV. CONCLUSION Trust is more important than money and will ultimately determine cloud computing success. In this project, a novel client-trust based approach for workflow scheduling, CTP-WFS, is presented. The proposed scheduling algorithm adopts a client-trust metric and prioritizes client requests based on the trust factor. The client-trust metric is a composite factor constituted by parameters such as payment on time, frequency of use and revenue generated. The weights of different criteria can be adjusted based on business needs. In this model, response time, profit and client-trust parameters are considered simultaneously to yield a genuinely optimal and beneficial solution while improving usability experience.
5
A Study on Service Oriented Network Virtualization convergence of Cloud Computing
A Study on Service Oriented Network Virtualization convergence of Cloud Computing 1 Kajjam Vinay Kumar, 2 SANTHOSH BODDUPALLI 1 Scholar(M.Tech),Department of Computer Science Engineering, Brilliant Institute
Estimating Trust Value for Cloud Service Providers using Fuzzy Logic
Estimating Trust Value for Cloud Service Providers using Fuzzy Logic Supriya M, Venkataramana L.J, K Sangeeta Department of Computer Science and Engineering, Amrita School of Engineering Kasavanahalli,
Supply Chain Platform as a Service: a Cloud Perspective on Business Collaboration
Supply Chain Platform as a Service: a Cloud Perspective on Business Collaboration Guopeng Zhao 1, 2 and Zhiqi Shen 1 1 Nanyang Technological University, Singapore 639798 2 HP Labs Singapore, Singapore
SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA
SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA J.RAVI RAJESH PG Scholar Rajalakshmi engineering college Thandalam, Chennai. [email protected] Mrs.
A Trust-Evaluation Metric for Cloud applications
A Trust-Evaluation Metric for Cloud applications Mohammed Alhamad, Tharam Dillon, and Elizabeth Chang Abstract Cloud services are becoming popular in terms of distributed technology because they allow
Achieve Better Ranking Accuracy Using CloudRank Framework for Cloud Services
Achieve Better Ranking Accuracy Using CloudRank Framework for Cloud Services Ms. M. Subha #1, Mr. K. Saravanan *2 # Student, * Assistant Professor Department of Computer Science and Engineering Regional
WORKFLOW ENGINE FOR CLOUDS
WORKFLOW ENGINE FOR CLOUDS By SURAJ PANDEY, DILEBAN KARUNAMOORTHY, and RAJKUMAR BUYYA Prepared by: Dr. Faramarz Safi Islamic Azad University, Najafabad Branch, Esfahan, Iran. Workflow Engine for clouds
Advanced Load Balancing Mechanism on Mixed Batch and Transactional Workloads
Advanced Load Balancing Mechanism on Mixed Batch and Transactional Workloads G. Suganthi (Member, IEEE), K. N. Vimal Shankar, Department of Computer Science and Engineering, V.S.B. Engineering College,
Grid Computing Vs. Cloud Computing
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 577-582 International Research Publications House http://www. irphouse.com /ijict.htm Grid
Customer Security Issues in Cloud Computing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 2, Issue.
A Novel Approach for Efficient Load Balancing in Cloud Computing Environment by Using Partitioning
A Novel Approach for Efficient Load Balancing in Cloud Computing Environment by Using Partitioning 1 P. Vijay Kumar, 2 R. Suresh 1 M.Tech 2 nd Year, Department of CSE, CREC Tirupati, AP, India 2 Professor
How To Understand Cloud Usability
Published in proceedings of HCI International 2015 Framework for Cloud Usability Brian Stanton 1, Mary Theofanos 1, Karuna P Joshi 2 1 National Institute of Standards and Technology, Gaithersburg, MD,
OCRP Implementation to Optimize Resource Provisioning Cost in Cloud Computing
OCRP Implementation to Optimize Resource Provisioning Cost in Cloud Computing K. Satheeshkumar PG Scholar K. Senthilkumar PG Scholar A. Selvakumar Assistant Professor Abstract- Cloud computing is a large-scale
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University
Resource Management In Cloud Computing With Increasing Dataset
Resource Management In Cloud Computing With Increasing Dataset Preeti Agrawal 1, Yogesh Rathore 2 1 CSE Department, CSVTU, RIT, Raipur, Chhattisgarh, INDIA Abstract In this paper we present the cloud computing
A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 16 (2014), pp. 1605-1610 International Research Publications House http://www. irphouse.com A Load Balancing
IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD
Journal homepage: www.mjret.in ISSN:2348-6953 IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD Deepak Ramchandara Lad 1, Soumitra S. Das 2 Computer Dept. 12 Dr. D. Y. Patil School of Engineering,(Affiliated
AN EFFICIENT LOAD BALANCING APPROACH IN CLOUD SERVER USING ANT COLONY OPTIMIZATION
AN EFFICIENT LOAD BALANCING APPROACH IN CLOUD SERVER USING ANT COLONY OPTIMIZATION Shanmuga Priya.J 1, Sridevi.A 2 1 PG Scholar, Department of Information Technology, J.J College of Engineering and Technology
Reallocation and Allocation of Virtual Machines in Cloud Computing Manan D. Shah a, *, Harshad B. Prajapati b
Proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA-14) Reallocation and Allocation of Virtual Machines in Cloud Computing Manan
Increased MSME and Global Entrepreneurship Due to Cloud Computing
Global Journal of Management and Business Studies. ISSN 2248-9878 Volume 3, Number 6 (2013), pp. 659-666 Research India Publications http://www.ripublication.com/gjmbs.htm Increased MSME and Global Entrepreneurship
Fig. 1 WfMC Workflow reference Model
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 10 (2014), pp. 997-1002 International Research Publications House http://www. irphouse.com Survey Paper on
Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka. www.ijreat.org
Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks Kruthika S G 1, VenkataRavana Nayak 2, Sunanda Allur 3 1, 2, 3 Department of Computer Science, Visvesvaraya Technological
Resource Allocation Avoiding SLA Violations in Cloud Framework for SaaS
Resource Allocation Avoiding SLA Violations in Cloud Framework for SaaS Shantanu Sasane Abhilash Bari Kaustubh Memane Aniket Pathak Prof. A. A.Deshmukh University of Pune University of Pune University
International Journal of Computer & Organization Trends Volume21 Number1 June 2015 A Study on Load Balancing in Cloud Computing
A Study on Load Balancing in Cloud Computing * Parveen Kumar * Er.Mandeep Kaur Guru kashi University,Talwandi Sabo Guru kashi University,Talwandi Sabo Abstract: Load Balancing is a computer networking
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,
A Survey on Cloud Computing
A Survey on Cloud Computing Poulami dalapati* Department of Computer Science Birla Institute of Technology, Mesra Ranchi, India [email protected] G. Sahoo Department of Information Technology Birla
Technical Enablers for Cloud Computing Successful Adoption
Technical Enablers for Cloud Computing Successful Adoption Torki Altameem Dept. of Computer Science, RCC, King Saud University, P.O. Box: 28095 11437 Riyadh-Saudi Arabia. [email protected] Abstract :
Federation of Cloud Computing Infrastructure
IJSTE International Journal of Science Technology & Engineering Vol. 1, Issue 1, July 2014 ISSN(online): 2349 784X Federation of Cloud Computing Infrastructure Riddhi Solani Kavita Singh Rathore B. Tech.
Cloud deployment model and cost analysis in Multicloud
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) ISSN: 2278-2834, ISBN: 2278-8735. Volume 4, Issue 3 (Nov-Dec. 2012), PP 25-31 Cloud deployment model and cost analysis in Multicloud
Cloud Based E-Government: Benefits and Challenges
Cloud Based E-Government: Benefits and Challenges Saleh Alshomrani 1 and Shahzad Qamar 2 1 Faculty of Computing and IT, King Abdulaziz University, Jeddah, Saudi Arabia 2 Faculty of Computing and IT, North
CONFIOUS * : Managing the Electronic Submission and Reviewing Process of Scientific Conferences
CONFIOUS * : Managing the Electronic Submission and Reviewing Process of Scientific Conferences Manos Papagelis 1, 2, Dimitris Plexousakis 1, 2 and Panagiotis N. Nikolaou 2 1 Institute of Computer Science,
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,
Survey on Models to Investigate Data Center Performance and QoS in Cloud Computing Infrastructure
Survey on Models to Investigate Data Center Performance and QoS in Cloud Computing Infrastructure Chandrakala Department of Computer Science and Engineering Srinivas School of Engineering, Mukka Mangalore,
VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud
VALUE PROPOSITION FOR SERVICE PROVIDERS Helping Service Providers accelerate adoption of the cloud Partnership with Service Providers Enabling Your Cloud Services in Complex Environments Today s challenge
Round Robin with Server Affinity: A VM Load Balancing Algorithm for Cloud Based Infrastructure
J Inf Process Syst, Vol.9, No.3, September 2013 pissn 1976-913X eissn 2092-805X http://dx.doi.org/10.3745/jips.2013.9.3.379 Round Robin with Server Affinity: A VM Load Balancing Algorithm for Cloud Based
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Ensuring Reliability and High Availability in Cloud by Employing a Fault Tolerance Enabled Load Balancing Algorithm G.Gayathri [1], N.Prabakaran [2] Department of Computer
1.1.1 Introduction to Cloud Computing
1 CHAPTER 1 INTRODUCTION 1.1 CLOUD COMPUTING 1.1.1 Introduction to Cloud Computing Computing as a service has seen a phenomenal growth in recent years. The primary motivation for this growth has been the
A Service Revenue-oriented Task Scheduling Model of Cloud Computing
Journal of Information & Computational Science 10:10 (2013) 3153 3161 July 1, 2013 Available at http://www.joics.com A Service Revenue-oriented Task Scheduling Model of Cloud Computing Jianguang Deng a,b,,
Dynamic Pricing for Usage of Cloud Resource
Dynamic Pricing for Usage of Cloud Resource K.Sangeetha, K.Ravikumar Graduate Student, Department of CSE, Rrase College of Engineering, Chennai, India. Professor, Department of CSE, Rrase College of Engineering,
Research on Trust Management Strategies in Cloud Computing Environment
Journal of Computational Information Systems 8: 4 (2012) 1757 1763 Available at http://www.jofcis.com Research on Trust Management Strategies in Cloud Computing Environment Wenjuan LI 1,2,, Lingdi PING
ANALYSIS OF WORKFLOW SCHEDULING PROCESS USING ENHANCED SUPERIOR ELEMENT MULTITUDE OPTIMIZATION IN CLOUD
ANALYSIS OF WORKFLOW SCHEDULING PROCESS USING ENHANCED SUPERIOR ELEMENT MULTITUDE OPTIMIZATION IN CLOUD Mrs. D.PONNISELVI, M.Sc., M.Phil., 1 E.SEETHA, 2 ASSISTANT PROFESSOR, M.PHIL FULL-TIME RESEARCH SCHOLAR,
INCREASING SERVER UTILIZATION AND ACHIEVING GREEN COMPUTING IN CLOUD
INCREASING SERVER UTILIZATION AND ACHIEVING GREEN COMPUTING IN CLOUD M.Rajeswari 1, M.Savuri Raja 2, M.Suganthy 3 1 Master of Technology, Department of Computer Science & Engineering, Dr. S.J.S Paul Memorial
Exploring Resource Provisioning Cost Models in Cloud Computing
Exploring Resource Provisioning Cost Models in Cloud Computing P.Aradhya #1, K.Shivaranjani *2 #1 M.Tech, CSE, SR Engineering College, Warangal, Andhra Pradesh, India # Assistant Professor, Department
Deadline Based Task Scheduling in Cloud with Effective Provisioning Cost using LBMMC Algorithm
Deadline Based Task Scheduling in Cloud with Effective Provisioning Cost using LBMMC Algorithm Ms.K.Sathya, M.E., (CSE), Jay Shriram Group of Institutions, Tirupur [email protected] Dr.S.Rajalakshmi,
The NREN s core activities are in providing network and associated services to its user community that usually comprises:
3 NREN and its Users The NREN s core activities are in providing network and associated services to its user community that usually comprises: Higher education institutions and possibly other levels of
A Framework to Improve Communication and Reliability Between Cloud Consumer and Provider in the Cloud
A Framework to Improve Communication and Reliability Between Cloud Consumer and Provider in the Cloud Vivek Sridhar Rational Software Group (India Software Labs) IBM India Bangalore, India Abstract Cloud
[Sudhagar*, 5(5): May, 2016] ISSN: 2277-9655 Impact Factor: 3.785
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY AVOID DATA MINING BASED ATTACKS IN RAIN-CLOUD D.Sudhagar * * Assistant Professor, Department of Information Technology, Jerusalem
Near Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
COMBINE DIFFERENT TRUST MANAGEMENT TECHNIQUE: RECOMMENDATIONAND REPUTATION IN CLOUD SERVICE. B.Brithi #1, K. Kiruthikadevi *2
COMBINE DIFFERENT TRUST : RECOMMENDATIONAND REPUTATION IN CLOUD SERVICE B.Brithi #1, K. Kiruthikadevi *2 1 P.G Scholar, Department of Computer Science and Engineering, Nandha College of Technology, Erode.
HP S POINT OF VIEW TO CLOUD
HP S POINT OF VIEW TO CLOUD Frank Bloch Director Technology Consulting 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice 3 GLOBAL MEGA
Monitoring Performances of Quality of Service in Cloud with System of Systems
Monitoring Performances of Quality of Service in Cloud with System of Systems Helen Anderson Akpan 1, M. R. Sudha 2 1 MSc Student, Department of Information Technology, 2 Assistant Professor, Department
Key Research Challenges in Cloud Computing
3rd EU-Japan Symposium on Future Internet and New Generation Networks Tampere, Finland October 20th, 2010 Key Research Challenges in Cloud Computing Ignacio M. Llorente Head of DSA Research Group Universidad
A Survey Paper: Cloud Computing and Virtual Machine Migration
577 A Survey Paper: Cloud Computing and Virtual Machine Migration 1 Yatendra Sahu, 2 Neha Agrawal 1 UIT, RGPV, Bhopal MP 462036, INDIA 2 MANIT, Bhopal MP 462051, INDIA Abstract - Cloud computing is one
TECHNOLOGY GUIDE THREE. Emerging Types of Enterprise Computing
TECHNOLOGY GUIDE THREE Emerging Types of Enterprise Computing TECHNOLOGY GU IDE OUTLINE TG3.1 Introduction TG3.2 Server Farms TG3.3 Virtualization TG3.4 Grid Computing TG3.5 Utility Computing TG3.6 Cloud
An Evolutionary Algorithm in Grid Scheduling by multiobjective Optimization using variants of NSGA
International Journal of Scientific and Research Publications, Volume 2, Issue 9, September 2012 1 An Evolutionary Algorithm in Grid Scheduling by multiobjective Optimization using variants of NSGA Shahista
Dynamic Load Balancing of Virtual Machines using QEMU-KVM
Dynamic Load Balancing of Virtual Machines using QEMU-KVM Akshay Chandak Krishnakant Jaju Technology, College of Engineering, Pune. Maharashtra, India. Akshay Kanfade Pushkar Lohiya Technology, College
An Approach Towards Customized Multi- Tenancy
I.J.Modern Education and Computer Science, 2012, 9, 39-44 Published Online September 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2012.09.05 An Approach Towards Customized Multi- Tenancy
A Survey on Carbon Emission Management and Intelligent System using Cloud
A Survey on Carbon Emission Management and Intelligent System using Cloud Dr.P EZHILARASU 1 (Associate Professor, Department of Computer Science and Engineering [email protected]) S SARANYA 2
Figure 1. The cloud scales: Amazon EC2 growth [2].
- Chung-Cheng Li and Kuochen Wang Department of Computer Science National Chiao Tung University Hsinchu, Taiwan 300 [email protected], [email protected] Abstract One of the most important issues
CLOUD MIGRATION STRATEGIES
CLOUD MIGRATION STRATEGIES Faculty Contributor: Dr. Rahul De Student Contributors: Mayur Agrawal, Sudheender S Abstract This article identifies the common challenges that typical IT managers face while
Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University
Cloud Computing: Opportunities, Challenges, and Solutions Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University What is cloud computing? What are some of the keywords? How many of you cannot
SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
Secured Storage of Outsourced Data in Cloud Computing
Secured Storage of Outsourced Data in Cloud Computing Chiranjeevi Kasukurthy 1, Ch. Ramesh Kumar 2 1 M.Tech(CSE), Nalanda Institute of Engineering & Technology,Siddharth Nagar, Sattenapalli, Guntur Affiliated
On Cloud Computing Technology in the Construction of Digital Campus
2012 International Conference on Innovation and Information Management (ICIIM 2012) IPCSIT vol. 36 (2012) (2012) IACSIT Press, Singapore On Cloud Computing Technology in the Construction of Digital Campus
Efficient Service Broker Policy For Large-Scale Cloud Environments
www.ijcsi.org 85 Efficient Service Broker Policy For Large-Scale Cloud Environments Mohammed Radi Computer Science Department, Faculty of Applied Science Alaqsa University, Gaza Palestine Abstract Algorithms,
CLOUD COMPUTING OVERVIEW
CLOUD COMPUTING OVERVIEW http://www.tutorialspoint.com/cloud_computing/cloud_computing_overview.htm Copyright tutorialspoint.com Cloud Computing provides us a means by which we can access the applications
Cloud Computing-based IT Solutions For Organizations with Multiregional Branch Offices
Cloud Computing-based IT Solutions For Organizations with Multiregional Branch Offices Harris Wang School of Computing and Information Systems Athabasca University, Athabasca, Canada [email protected]
Managing Cloud Services in the Enterprise The Value of Cloud Services Brokers
Whitepaper: Managing Cloud Services in the Enterprise The Value of Cloud Services Brokers Whitepaper: Managing Cloud Services in the Enterprise 2 The cloud has revolutionized the way businesses operate
FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS
International Journal of Computer Engineering and Applications, Volume VIII, Issue II, November 14 FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS Saju Mathew 1, Dr.
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
VIEW POINT. Getting cloud management and sustenance right! It is not about cloud, it s about tomorrow s enterprise
VIEW POINT Getting cloud management and sustenance right! It is not about cloud, it s about tomorrow s enterprise Soma Sekhar Pamidi, Vinay Srivastava, Mayur Chakravarty The dynamic technologies of cloud
Trust and Reputation Management in Distributed Systems
Trust and Reputation Management in Distributed Systems Máster en Investigación en Informática Facultad de Informática Universidad Complutense de Madrid Félix Gómez Mármol, Alemania ([email protected])
Keywords: Cloudsim, MIPS, Gridlet, Virtual machine, Data center, Simulation, SaaS, PaaS, IaaS, VM. Introduction
Vol. 3 Issue 1, January-2014, pp: (1-5), Impact Factor: 1.252, Available online at: www.erpublications.com Performance evaluation of cloud application with constant data center configuration and variable
A REVIEW ON DYNAMIC FAIR PRIORITY TASK SCHEDULING ALGORITHM IN CLOUD COMPUTING
International Journal of Science, Environment and Technology, Vol. 3, No 3, 2014, 997 1003 ISSN 2278-3687 (O) A REVIEW ON DYNAMIC FAIR PRIORITY TASK SCHEDULING ALGORITHM IN CLOUD COMPUTING Deepika Saxena,
Multi-Tenant Engineering Architecture in SaaS
Multi-Tenant Engineering Architecture in SaaS Sunil Kumar Khatri Himanshu Singhal Khushboo Bahri ABSTRACT Multi-Tenancy in SaaS (Software as a Service) architecture is the concept leveraging cloud computing
K.Niha, Dr. W.Aisha Banu, Ruby Anette
International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 41 A Cloud Service Providers Ranking System Using Ontology K.Niha, Dr. W.Aisha Banu, Ruby Anette Abstract Cloud
The cloud - ULTIMATE GAME CHANGER ===========================================
The cloud - ULTIMATE GAME CHANGER =========================================== When it comes to emerging technologies, there is one word that has drawn more controversy than others: The Cloud. With cloud
Cloud Computing for Agent-based Traffic Management Systems
Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion
ENERGY-EFFICIENT TASK SCHEDULING ALGORITHMS FOR CLOUD DATA CENTERS
ENERGY-EFFICIENT TASK SCHEDULING ALGORITHMS FOR CLOUD DATA CENTERS T. Jenifer Nirubah 1, Rose Rani John 2 1 Post-Graduate Student, Department of Computer Science and Engineering, Karunya University, Tamil
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
IMPLEMENTATION OF RELIABLE CACHING STRATEGY IN CLOUD ENVIRONMENT
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE IMPLEMENTATION OF RELIABLE CACHING STRATEGY IN CLOUD ENVIRONMENT M.Swapna 1, K.Ashlesha 2 1 M.Tech Student, Dept of CSE, Lord s Institute
Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing
Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Survey on Load
Investigation of Cloud Computing: Applications and Challenges
Investigation of Cloud Computing: Applications and Challenges Amid Khatibi Bardsiri Anis Vosoogh Fatemeh Ahoojoosh Research Branch, Islamic Azad University, Sirjan, Iran Research Branch, Islamic Azad University,
Sla Aware Load Balancing Algorithm Using Join-Idle Queue for Virtual Machines in Cloud Computing
Sla Aware Load Balancing Using Join-Idle Queue for Virtual Machines in Cloud Computing Mehak Choudhary M.Tech Student [CSE], Dept. of CSE, SKIET, Kurukshetra University, Haryana, India ABSTRACT: Cloud
PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM
PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM Akmal Basha 1 Krishna Sagar 2 1 PG Student,Department of Computer Science and Engineering, Madanapalle Institute of Technology & Science, India. 2 Associate
International Journal of Management (IJM), ISSN 0976 6502(Print), ISSN 0976 6510(Online), Volume 3, Issue 1, January- April (2012)
INTERNATIONAL JOURNAL OF MANAGEMENT (IJM) International Journal of Management (IJM), ISSN 0976 6502(Print), ISSN 0976 ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 3, Issue 1, January- April (2012),
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
Karthi M,, 2013; Volume 1(8):1062-1072 INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK EFFICIENT MANAGEMENT OF RESOURCES PROVISIONING
A Hybrid Load Balancing Policy underlying Cloud Computing Environment
A Hybrid Load Balancing Policy underlying Cloud Computing Environment S.C. WANG, S.C. TSENG, S.S. WANG*, K.Q. YAN* Chaoyang University of Technology 168, Jifeng E. Rd., Wufeng District, Taichung 41349
Cloud Computing Simulation Using CloudSim
Cloud Computing Simulation Using CloudSim Ranjan Kumar #1, G.Sahoo *2 # Assistant Professor, Computer Science & Engineering, Ranchi University, India Professor & Head, Information Technology, Birla Institute
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS Survey of Optimization of Scheduling in Cloud Computing Environment Er.Mandeep kaur 1, Er.Rajinder kaur 2, Er.Sughandha Sharma 3 Research Scholar 1 & 2 Department of Computer
Monitoring Data Integrity while using TPA in Cloud Environment
Monitoring Data Integrity while using TPA in Cloud Environment Jaspreet Kaur, Jasmeet Singh Abstract Cloud Computing is the arising technology that delivers software, platform and infrastructure as a service
