Performance Gathering and Implementing Portability on Cloud Storage Data
|
|
|
- Kristian Barton
- 10 years ago
- Views:
Transcription
1 International Journal of Information & Computation Technology. ISSN Volume 4, Number 17 (2014), pp International Research Publications House irphouse.com Performance Gathering and Implementing Portability on Cloud Storage Data Rakesh Sachdeva 1, Prabhpreet Kaur 2 1, 2 Dept. of CSE, Guru Nanak Dev University Amritsar, India. Abstract As information and communication technology develop rapidly. Researchers, Journalists, experts and IT analysts are referring towards the cloud as a technology revolution. Cloud computing is not just a fad anymore. Even in short, cloud computing is completely is affecting almost everyone in real. It is a distributed computing model for enabling on-demand access to rapidly scalable resources, the resources include infrastructure as a service (IaaS), platforms as a service (PaaS), and software as a service (SaaS). Cloud Computing can be very beneficial for both small scale and middle scale organizations as these organizations can lease IaaS at economical rates which reduces capital cost. Quality of Service (QoS) is monitor and maintained by signing a Service Level Agreement (SLA) between cloud providers and users. The focus of this research paper is to solve the issue of portability conflict in IaaS offerings and is a roadmap toward more competitive market for cloud providers and users. The focus of this research is to solve portability conflict in IaaS offering. An algorithm is proposed for providing compensation in case of violation of stated SLA. A live migration technique also has been explained to migrate storage data from one cloud provider to another more securely.. Keywords- IaaS, Virtualization, parameters, SLA, Migration, OVF, Cloudsim, Temporary keys. Introduction In today s world, Technology plays the major role, as it enables creation of new platforms for the business, with the development of new technology devices. With the development in new networking technologies and the increase in the demand for computing resources, many organizations have been prompted to outsource their IaaS resources such as storage, networks or other computing needs from the cheaper
2 1816 Rakesh Sachdeva, Prabhpreet Kaur infrastructure resources provided by cloud providers. The IaaS provisioning deals with the physical allocation, configuration and implementation of different resources, which involve different physical hosts, storage services, different virtualization technologies, as well as and networks in the cloud along with the datacenters, virtual machines on different locations. The main reason why most of the organizations are moving towards cloud computing paradigm is due to the scalability, on-demand Services and pay as you use policies. Scalable means infrastructure automatically scales up and down according to requirement. Cloud computing also provides infinite number of resources virtually for users on demand over the network so users can rent IT resources, they can compose their software systems for dynamic and flexible need. Pay as you use model works on the policy of money is paid until the provisioned resources are used for example Processor for two hours and storage for five days. Despite the advancement in the technology of Cloud Computing from industry as well as academics contributions, it faces some challenges for its worldwide adoption especially in the case of small organizations. The main reason for not adopting this technology is that most of the current cloud solutions do not meet the considerations of portability and interoperability. In Portable environment users can compare the services and choose from different providers and can easily switch between different Cloud providers without effecting user data and configuration. Cloud Computing is pay-as-you-use model which totally depends upon quality of services provided by the provider. If the services provided by the providers are taking more time, money than conventional methods then no one will adopt these services. If quality of service is discussed earlier and signed by both parties then provider is bonded to provide that level of service which increases adoption and trust of consumers in Cloud Computing. A Service Level Agreement (SLA) plays very valuable role for all parties in terms of understanding cost, schedule and performance because their relationship is stated explicitly. SLA s creation is very complex and difficult task. As both parties should be benefitted from SLA so, Service provider should know all types risks that may evolve in SLA before signing it. Mastroeni et al. [1] examine the risk of violating the SLA obligations. Many agreements are signed before using Cloud services and compensation is provided for violations as per discussed in agreement but when a violation of privacy and illegal access to sensitive information is detected, it could become difficult to identify who is liable for such violations in virtualized environment [2]. Cloud resources are based on SLA, which states usage terms and conditions and proper compensation for violations. QoS information provided by cloud provider can t be trusted because data source is in control of resource provider rather than Cloud user. How Cloud user will know its SLA is achieved or not? Process is required to specify and manage SLA so that information can t be change or false. Most of the algorithms are focused on violation towards the users only even if the user wants to migrate its storage before its time completion as the users does not getting the desired performance from its current provider. So an proper compensation algorithm is needed when there is any violation. Cloud can be commonly classified as either private or public. As a user of public storage cloud, requirements like price, security level, and storage amounts varies among different users. If the service provided by the current cloud provider does not
3 Performance Gathering and Implementing Portability on Cloud Storage Data 1817 meet user s needs, users have to choose another service provider. The reason for which a user wants to change their current Cloud Service Provider may be due to change in business and technical strategy or dissatisfaction from services of current Cloud service Provider. It will be more convenient to the user to move their storage data to another cloud provider. Performance gathering As SLA is signed by all providers and users and it is monitored by a third party SLA Manager. SLA manager evaluates the performance of the Cloud Providers. To evaluate the performance of me need an efficient simulator which can check the performance of current cloud provider on the basis of different parameters such as speed, accuracy or storage or instructions execution per sec. Scilab is an good option to check the performance of check the performance of distributed environment. Based upon some factors and parameters, some graphs has been generated, which analyses the performance of both current Cloud Provider and the cloud provider to where the data have to migrate. It observers all values of most of the parameters which are signed during the Service Level Agreement by the Cloud Service providers as well as the offered services during the running period of time to the users based upon that performance the user decide whether there is any need to migrate from current storage service provider if the offered services scale does not matches with desired or signed service s scale during SLA. Fig 1(a) Instruction execution Time Graph
4 1818 Rakesh Sachdeva, Prabhpreet Kaur. Fig.1(b)Transfer rate comparision graph Figure 1(a) shows the variability in execution of the instructions rate of different cloud providers. Desired value is the value which is signed during SLA or for which the user is paying. P.V is the Persistence value provides the probability to which the value can be persist. Every Desired value can t be achieved in real time application because of many reasons. For example, There are total 3, 00, 000 of instructions. Desired rate for executions of the instructions is 138 instructions per second (MIPS) so 138 concurrent requests can be managed by provider and here PV value is 124 means the service provider has to execute at least 124 instructions per second but not less than 124.As shown in fig1(a), the current service provider (Provider 1) is enable to provide that scale of the services for which the user has signed for. There are some points at which provider 1 is offering services of instruction execution per second is below P.V which leads to loss of quality of services and offering for which the user is paying. On the other hand the Provider 2, has the services and offering of instruction execution per second is always above the P.V. Similar is the case of Transfer rate Comparison graph in figure 1(b), where the transmission rate offered by both cloud Service providers i.e current cloud provider and service provider where the data has to be migrate. Here is the variability observed while performance gathering in both cloud providers for which the user is paying or going to pay. Again, there are some points in which transfer rate is below persistence value of current service provider which may effects the clients of the user for which the user is paying to cloud service provider. On the other hand, the provider 2 s transfer rate is still above the Persistence value. So, if the services or parameters offered by the current cloud provider are most of the time below P.V the user has to
5 Performance Gathering and Implementing Portability on Cloud Storage Data 1819 take decision of migration of their whole storage data to another which will provide better services to the users on the same cost on same amount of data. SLA COMPENSATION generation ALGORITHM This paper presents a solution for portability conflicts raised during deployment and migration of data in a IaaS environment by separating three fundamental IaaS entities: Application, User Data and Infrastructure. Quality of Service (QoS) is maintained by signing a Service Level Agreement (SLA) between all parties and it is monitored by third party SLA manager. With the introduction of Service Level Agreement (SLA) and SLA violation compensation algorithms quality of service delivered is maintained. Many agreements are signed before using Cloud services and proper compensation is provided for violations. But when a violation of privacy and illegal access to sensitive information is detected, it could become difficult to identify who is liable for such violations in virtualized environment. An algorithm is proposed for providing compensation in case of violation of stated SLA. In which, the user doesn t have to worry about Quality because proper compensation will be provided if SLA is violated. In Automated IaaS management Architecture SLA manager finds any violation from signed SLA and calculates its compensation. Here, an algorithm is proposed to calculate compensation. Desire Value DV is value that provider promise to provide to Cloud user. It is recorded when provider and user signed SLA. Persistence Value: PV provides the probability to which desired value will be achieved or the least value for which the cloud user can persist or tolerate.
6 1820 Rakesh Sachdeva, Prabhpreet Kaur Achieved Value AV is value of metrics that is actually achieved or provided by provider. Its value is continuously by SLA monitoring organization. Time: It is amount of time after which each metrics will be checked. By default this value is in months. Compensation per Unit It is amount of cost to be paid in compensation for each unit of PV. This value is in Dollars. Here in Figure 2, an example has been explained in which cloud service provider has to be pay an compensation amount of 2294$ to the cloud provider for the violation of their services as mentioned in the Service Level Agreement. Fig.2 Compensation Generation Program Portability of storage data Portability is ability to move data or application from one provider to another provider without any loss, large cost or security issues. Data is trapped with single provider so it forces cloud user to stay with one service provider. Achieving data portability is difficult because different cloud providers use different models, programming languages and market paradigms and their own version of same technology. These
7 Performance Gathering and Implementing Portability on Cloud Storage Data 1821 models are difficult to change or adapt because they are transparent to cloud user. Big organizations like Amazon, Google, Facebook and Microsoft are reluctant to agree on widely accepted standards promoting their own standards making it more difficult and complicated. Dominance of big organizations increases the lock-in factor and it affects small scale and middle scale companies to enter into the cloud market. Lack of much common standards between different Cloud Service Provider also is a one of the major hurdle in portability i.e. different packaging standards and framework can possibly lead to different portability solutions which are not compatible with each other. Among different standards, there exist an common DMTF [3] Open Virtualization Format (OVF), is a first step towards hypervisor independence thus achieving Cloud portability. OVF format standardizes the use of storage container that stores metadata of virtual machine and enables the migration of virtual machine. But the lack of property factor with this standard is that it is an offline method of migrating the stored data from one cloud Service Provider to another. As the user is not satisfied with performance of the current cloud provider, he/she wants to port or migrate their storage data to another cloud provider. The whole procedure of data migration between Cloud Storage Provider 1 and Cloud Storage Provider 2. There are three kinds of entities which involve in the process. User: User is the authenticated person who wants to migrate their Storage data and sends the migration request to its storage service provider. Central node: The central node of the current Storage Provider i.e. source cluster checks the authentication of user s command to start the migration task if valid and accept the read request from the data node where the actual data of that user is stored in the source cluster and returns the address of the data. The central node of the target system or where the data is to be migrate, is responsible for processing the write requests from Data Nodes of source Provider. Data Node: Data node stores the user s data and process the any kind of data rad and write request from its Central Node. implementing secure migration process Our technical prototype is based on subproject CloudSim [4]: a toolkit for modeling and simulation of cloud. The CloudSim toolkit simulates a distributed file system comprised of clusters of cheap machines. It supports behavior and system modeling of Cloud components such as data centers, Cloudlets, virtual machines, Brokers and resource provisioning components such as common cloud storage architecture. DATACENTERS act as Central Node in the whole procedure and their STORAGE NODES act as Data Nodes in the CloudSim. The data which is to be migrated packed
8 1822 Rakesh Sachdeva, Prabhpreet Kaur in the OVF standard format in Hypervisor such as VMware or VirtualBox using OVF Tool. Then these OVF file is uploaded in CloudSim and migrated through one cloud s DataCenter s nodes to another DataCenter s nodes. The results of the current and target cloud provider has been simulated through CloudSim. The security in migration process[5][6] of whole storage data is achieved in the through the following procedure. The secure migration in the entire process works as follows: After verifying the request for Storage migration permission of User, the SLA will request a SSL(Secure Socket Layer) connection between both DataCenters of Cloud Systems. Then these two DataCenters will negotiate for related parameters like temporary session key for message authentication code (MAC) computing, rndm key (randomly generated key) for symmetric encryption and the temporary tickets with minimum migration privilege. After getting migration request from cloud provider 1 s DataCenter, cloud provider 2 s DataCenter will generate a temporary session key (Tmp key) that will be used for communication between the both DataCenter nodes, and generates a random number (Rndm hash) that will be used for double hash computation. Then, the target DataCenter sends Temp Key and Rndm hash to the source DataCenter. After distributing migration tasks to Nodes, the cloud provider 1 s DataCenter sends a request for tickets with the list of IP addresses of Nodes. System 2 s DataCenter generates a series of tickets and encrypts the tickets by Temp Key, a key only known by cloud provider 2, vand then returns the encrypted tickets T to cloud provider 1 s DataCenter. Where T=(tickets{IP, Temp Key {ticket(s, ip, attual_filepath)}}) After receiving the encrypted tickets, the cloud provider 1 s DataCenter distributes the ticket, Temp Key, and Rndm hash to its every Nodes one by one. The SSL connection terminates after the distribution of keys. Every Node of cloud provider1 s Datacenter encrypts the encypted tickets with a timestamp by Temp Key, and send the Double encypted tickets to cloud provider 2 s DataCenter. Cloud Provider 2 s DataCenter decrypts the tickets and the timestamp is updated to every ticket, and eventually, it will return the address of Cloud Provider 2 s Node one by one which the cloud Provider 1 s Node sends block to. Every node of cloud provider 1 receives the address of every node of Cloud provider 2. Before the transmission, Node will encrypt the block using session key, make a hash value (Hash1) to block and another hash value (Hash 2)by using Rndm hash. Then, Cloud provider 2 s Node sends the three parts to Cloud Provider 2 s Node.
9 Performance Gathering and Implementing Portability on Cloud Storage Data 1823 The CloudSim tool used for large inter-cluster migration and the work of migrating of data is done by the nodes that run in parallel across the cluster. The secure migration between inter-cloud control is implemented in the DataCenters. CloudSim is a secure communication protocols between two Datacenters and between Storage Nodes uses block transmission protection. Conclusion This paper measures the essential parameters required to measure the performance of a cloud system. This paper also discuses an insight to the essential aspect of accepting standardization in Cloud computing, independence in cloud IaaS environment and portability using virtualization. Performance of cloud provider is measured by a third party called SLA manager, which checks the performance and values of parameters that has been signed during agreement between both parties users and cloud provider. If the desired or upto its persistent value not achieved then the cloud provider has to pay a proper compensation to the user for their loss of services parameters values. After that the user is independent to move to another cloud provider. References [1] Loretta Mastroeni and Maurizio Naldi, "Violation of Service Availability Targets in Service Level Agreements, " in Proceedings of the Federated Conference on Computer Science and Information Systems, 2011, pp [2] Vmware Inc., "Developer s Guide to Building vapps and Virtual Appliances", Palo Alto, CA, User Manual EN , [3] DMTF, "Open Virtualization Format v.1.0, " DMTF, White Paper DSP 2017 v1.0.0, [4] Rodrigo N. Calheiros, Rajiv Ranjan, Anton Beloglazov, Cesar A. F. De Rose, and Rajkumar Buyya. Cloudsim: a toolkit for modelling and [5] simulation of cloud computing environments and evaluation of resource provisioning algorithms. Softw. Pract. Exper.,, January Govindarajan and Lakshmanan, "Overview of Cloud Standards, " Cloud Computing, Springer London, vol. 1, no. 1, pp , [6] S.Kmara, K.Lauter, Cryptographic Cloud Storage, Proceedings of Financial Cryptography: Workshop on Real-Life Cryptographic Protocols and Standardization 2010, January 2010, pp [7] Shen Q., Zhang L., Yang X., Yang Y., Wu Z., SecDM: Securing Data Migration Between Cloud Storage Systems, in 9 th IEEE International Conference on Dependable, Autonomic and Secure Computing, 2011, pp
10
Dynamic Round Robin for Load Balancing in a Cloud Computing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 6, June 2013, pg.274
SLA BASED SERVICE BROKERING IN INTERCLOUD ENVIRONMENTS
SLA BASED SERVICE BROKERING IN INTERCLOUD ENVIRONMENTS Foued Jrad, Jie Tao and Achim Streit Steinbuch Centre for Computing, Karlsruhe Institute of Technology, Karlsruhe, Germany {foued.jrad, jie.tao, achim.streit}@kit.edu
Cloud Computing Simulation Using CloudSim
Cloud Computing Simulation Using CloudSim Ranjan Kumar #1, G.Sahoo *2 # Assistant Professor, Computer Science & Engineering, Ranchi University, India Professor & Head, Information Technology, Birla Institute
Performance Analysis of VM Scheduling Algorithm of CloudSim in Cloud Computing
IJECT Vo l. 6, Is s u e 1, Sp l-1 Ja n - Ma r c h 2015 ISSN : 2230-7109 (Online) ISSN : 2230-9543 (Print) Performance Analysis Scheduling Algorithm CloudSim in Cloud Computing 1 Md. Ashifuddin Mondal,
CloudSim: A Toolkit for Modeling and Simulation of Cloud Computing Environments and Evaluation of Resource Provisioning Algorithms
CloudSim: A Toolkit for Modeling and Simulation of Cloud Computing Environments and Evaluation of Resource Provisioning Algorithms Rodrigo N. Calheiros, Rajiv Ranjan, Anton Beloglazov, César A. F. De Rose,
Multilevel Communication Aware Approach for Load Balancing
Multilevel Communication Aware Approach for Load Balancing 1 Dipti Patel, 2 Ashil Patel Department of Information Technology, L.D. College of Engineering, Gujarat Technological University, Ahmedabad 1
Utilizing Round Robin Concept for Load Balancing Algorithm at Virtual Machine Level in Cloud Environment
Utilizing Round Robin Concept for Load Balancing Algorithm at Virtual Machine Level in Cloud Environment Stuti Dave B H Gardi College of Engineering & Technology Rajkot Gujarat - India Prashant Maheta
Profit Based Data Center Service Broker Policy for Cloud Resource Provisioning
I J E E E C International Journal of Electrical, Electronics ISSN No. (Online): 2277-2626 and Computer Engineering 5(1): 54-60(2016) Profit Based Data Center Service Broker Policy for Cloud Resource Provisioning
Keywords: Cloudsim, MIPS, Gridlet, Virtual machine, Data center, Simulation, SaaS, PaaS, IaaS, VM. Introduction
Vol. 3 Issue 1, January-2014, pp: (1-5), Impact Factor: 1.252, Available online at: www.erpublications.com Performance evaluation of cloud application with constant data center configuration and variable
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University
CDBMS Physical Layer issue: Load Balancing
CDBMS Physical Layer issue: Load Balancing Shweta Mongia CSE, School of Engineering G D Goenka University, Sohna [email protected] Shipra Kataria CSE, School of Engineering G D Goenka University,
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 4, July-Aug 2014
RESEARCH ARTICLE An Efficient Service Broker Policy for Cloud Computing Environment Kunal Kishor 1, Vivek Thapar 2 Research Scholar 1, Assistant Professor 2 Department of Computer Science and Engineering,
Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing
Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing Deep Mann ME (Software Engineering) Computer Science and Engineering Department Thapar University Patiala-147004
Simulation-based Evaluation of an Intercloud Service Broker
Simulation-based Evaluation of an Intercloud Service Broker Foued Jrad, Jie Tao and Achim Streit Steinbuch Centre for Computing, SCC Karlsruhe Institute of Technology, KIT Karlsruhe, Germany {foued.jrad,
Cloud deployment model and cost analysis in Multicloud
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) ISSN: 2278-2834, ISBN: 2278-8735. Volume 4, Issue 3 (Nov-Dec. 2012), PP 25-31 Cloud deployment model and cost analysis in Multicloud
Dr. J. W. Bakal Principal S. S. JONDHALE College of Engg., Dombivli, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Factor based Resource
Reallocation and Allocation of Virtual Machines in Cloud Computing Manan D. Shah a, *, Harshad B. Prajapati b
Proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA-14) Reallocation and Allocation of Virtual Machines in Cloud Computing Manan
Grid Computing Vs. Cloud Computing
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 577-582 International Research Publications House http://www. irphouse.com /ijict.htm Grid
International Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 6, June 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
EFFICIENT VM LOAD BALANCING ALGORITHM FOR A CLOUD COMPUTING ENVIRONMENT
EFFICIENT VM LOAD BALANCING ALGORITHM FOR A CLOUD COMPUTING ENVIRONMENT Jasmin James, 38 Sector-A, Ambedkar Colony, Govindpura, Bhopal M.P Email:[email protected] Dr. Bhupendra Verma, Professor
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS *Dr Umesh Sehgal, #Shalini Guleria *Associate Professor,ARNI School of Computer Science,Arni University,[email protected]
Lecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
A Proposed Service Broker Policy for Data Center Selection in Cloud Environment with Implementation
A Service Broker Policy for Data Center Selection in Cloud Environment with Implementation Dhaval Limbani*, Bhavesh Oza** *(Department of Information Technology, S. S. Engineering College, Bhavnagar) **
Comparison of PBRR Scheduling Algorithm with Round Robin and Heuristic Priority Scheduling Algorithm in Virtual Cloud Environment
www.ijcsi.org 99 Comparison of PBRR Scheduling Algorithm with Round Robin and Heuristic Priority Scheduling Algorithm in Cloud Environment Er. Navreet Singh 1 1 Asst. Professor, Computer Science Department
Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing
Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Survey on Load
Modeling Local Broker Policy Based on Workload Profile in Network Cloud
Modeling Local Broker Policy Based on Workload Profile in Network Cloud Amandeep Sandhu 1, Maninder Kaur 2 1 Swami Vivekanand Institute of Engineering and Technology, Banur, Punjab, India 2 Swami Vivekanand
Cloud computing: the state of the art and challenges. Jānis Kampars Riga Technical University
Cloud computing: the state of the art and challenges Jānis Kampars Riga Technical University Presentation structure Enabling technologies Cloud computing defined Dealing with load in cloud computing Service
Energy Optimized Virtual Machine Scheduling Schemes in Cloud Environment
Abstract Energy Optimized Virtual Machine Scheduling Schemes in Cloud Environment (14-18) Energy Optimized Virtual Machine Scheduling Schemes in Cloud Environment Ghanshyam Parmar a, Dr. Vimal Pandya b
CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India
CLOUD COMPUTING 1 Er. Simar Preet Singh, 2 Er. Anshu Joshi 1 Assistant Professor, Computer Science & Engineering, DAV University, Jalandhar, Punjab, India 2 Research Scholar, Computer Science & Engineering,
A Survey Paper: Cloud Computing and Virtual Machine Migration
577 A Survey Paper: Cloud Computing and Virtual Machine Migration 1 Yatendra Sahu, 2 Neha Agrawal 1 UIT, RGPV, Bhopal MP 462036, INDIA 2 MANIT, Bhopal MP 462051, INDIA Abstract - Cloud computing is one
International Journal of Computer & Organization Trends Volume21 Number1 June 2015 A Study on Load Balancing in Cloud Computing
A Study on Load Balancing in Cloud Computing * Parveen Kumar * Er.Mandeep Kaur Guru kashi University,Talwandi Sabo Guru kashi University,Talwandi Sabo Abstract: Load Balancing is a computer networking
Proof of Retrivability: A Third Party Auditor Using Cloud Computing
Proof of Retrivability: A Third Party Auditor Using Cloud Computing Vijayaraghavan U 1, Madonna Arieth R 2, Geethanjali K 3 1,2 Asst. Professor, Dept of CSE, RVS College of Engineering& Technology, Pondicherry
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 4, July-Aug 2014
RESEARCH ARTICLE An Efficient Priority Based Load Balancing Algorithm for Cloud Environment Harmandeep Singh Brar 1, Vivek Thapar 2 Research Scholar 1, Assistant Professor 2, Department of Computer Science
A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
VM Provisioning Policies to Improve the Profit of Cloud Infrastructure Service Providers
VM Provisioning Policies to mprove the Profit of Cloud nfrastructure Service Providers Komal Singh Patel Electronics and Computer Engineering Department nd ian nstitute of Technology Roorkee Roorkee, ndia
An Efficient Cloud Service Broker Algorithm
An Efficient Cloud Service Broker Algorithm 1 Gamal I. Selim, 2 Rowayda A. Sadek, 3 Hend Taha 1 College of Engineering and Technology, AAST, [email protected] 2 Faculty of Computers and Information, Helwan
How To Compare Cloud Computing To Cloud Platforms And Cloud Computing
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Platforms
An Efficient Approach for Task Scheduling Based on Multi-Objective Genetic Algorithm in Cloud Computing Environment
IJCSC VOLUME 5 NUMBER 2 JULY-SEPT 2014 PP. 110-115 ISSN-0973-7391 An Efficient Approach for Task Scheduling Based on Multi-Objective Genetic Algorithm in Cloud Computing Environment 1 Sourabh Budhiraja,
Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges.
Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges. B.Kezia Rani 1, Dr.B.Padmaja Rani 2, Dr.A.Vinaya Babu 3 1 Research Scholar,Dept of Computer Science, JNTU, Hyderabad,Telangana
International Journal of Digital Application & Contemporary research Website: www.ijdacr.com (Volume 2, Issue 9, April 2014)
Green Cloud Computing: Greedy Algorithms for Virtual Machines Migration and Consolidation to Optimize Energy Consumption in a Data Center Rasoul Beik Islamic Azad University Khomeinishahr Branch, Isfahan,
Full Length Research Article
Available online at http://www.journalijdr.com International Journal of DEVELOPMENT RESEARCH ISSN: 2230-9926 International Journal of Development Research Vol. 4, Issue, 5, pp. 1035-1040, May, 2014 Full
PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM
PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM Akmal Basha 1 Krishna Sagar 2 1 PG Student,Department of Computer Science and Engineering, Madanapalle Institute of Technology & Science, India. 2 Associate
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,
Cloud Computing Services and its Application
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 1 (2014), pp. 107-112 Research India Publications http://www.ripublication.com/aeee.htm Cloud Computing Services and its
DESIGN OF A PLATFORM OF VIRTUAL SERVICE CONTAINERS FOR SERVICE ORIENTED CLOUD COMPUTING. Carlos de Alfonso Andrés García Vicente Hernández
DESIGN OF A PLATFORM OF VIRTUAL SERVICE CONTAINERS FOR SERVICE ORIENTED CLOUD COMPUTING Carlos de Alfonso Andrés García Vicente Hernández 2 INDEX Introduction Our approach Platform design Storage Security
Resource Allocation Based On Agreement with Data Security in Cloud Computing
International Journal of Emerging Science and Engineering (IJESE) Resource Allocation Based On Agreement with Data Security in Cloud Computing Aparna D. Deshmukh, Archana Nikose Abstract- Cloud computing
Service Broker Algorithm for Cloud-Analyst
Service Broker Algorithm for Cloud-Analyst Rakesh Kumar Mishra, Sreenu Naik Bhukya Department of Computer Science & Engineering National Institute of Technology Calicut, India Abstract Cloud computing
Dr. Ravi Rastogi Associate Professor Sharda University, Greater Noida, India
Volume 4, Issue 5, May 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Round Robin Approach
Efficient Qos Based Resource Scheduling Using PAPRIKA Method for Cloud Computing
Efficient Qos Based Resource Scheduling Using PAPRIKA Method for Cloud Computing Hilda Lawrance* Post Graduate Scholar Department of Information Technology, Karunya University Coimbatore, Tamilnadu, India
Security Model for VM in Cloud
Security Model for VM in Cloud 1 Venkataramana.Kanaparti, 2 Naveen Kumar R, 3 Rajani.S, 4 Padmavathamma M, 5 Anitha.C 1,2,3,5 Research Scholars, 4Research Supervisor 1,2,3,4,5 Dept. of Computer Science,
2) Xen Hypervisor 3) UEC
5. Implementation Implementation of the trust model requires first preparing a test bed. It is a cloud computing environment that is required as the first step towards the implementation. Various tools
CLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM
CLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM Taha Chaabouni 1 and Maher Khemakhem 2 1 MIRACL Lab, FSEG, University of Sfax, Sfax, Tunisia [email protected] 2 MIRACL Lab, FSEG, University
LOAD BALANCING OF USER PROCESSES AMONG VIRTUAL MACHINES IN CLOUD COMPUTING ENVIRONMENT
LOAD BALANCING OF USER PROCESSES AMONG VIRTUAL MACHINES IN CLOUD COMPUTING ENVIRONMENT 1 Neha Singla Sant Longowal Institute of Engineering and Technology, Longowal, Punjab, India Email: 1 [email protected]
CLOUD COMPUTING SECURITY CONCERNS
CLOUD COMPUTING SECURITY CONCERNS ABSTRACT ASMA GULAM MOHAMED Saveetha School of Engineering Cloud computing is set of resources including data storage, programs and hardware offered through the Internet.
How To Understand Cloud Computing
Overview of Cloud Computing (ENCS 691K Chapter 1) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ Overview of Cloud Computing Towards a definition
An enhanced QoS Architecture based Framework for Ranking of Cloud Services
An enhanced QoS Architecture based Framework for Ranking of Cloud Services Mr.K.Saravanan #1, M.Lakshmi Kantham #2 1 Assistant Professor, 2 PG Scholar Department of Computer Science and Engineering Anna
Energy Conscious Virtual Machine Migration by Job Shop Scheduling Algorithm
Energy Conscious Virtual Machine Migration by Job Shop Scheduling Algorithm Shanthipriya.M 1, S.T.Munusamy 2 ProfSrinivasan. R 3 M.Tech (IT) Student, Department of IT, PSV College of Engg & Tech, Krishnagiri,
Effective Virtual Machine Scheduling in Cloud Computing
Effective Virtual Machine Scheduling in Cloud Computing Subhash. B. Malewar 1 and Prof-Deepak Kapgate 2 1,2 Department of C.S.E., GHRAET, Nagpur University, Nagpur, India [email protected] and [email protected]
SERVICE BROKER ROUTING POLICES IN CLOUD ENVIRONMENT: A SURVEY
SERVICE BROKER ROUTING POLICES IN CLOUD ENVIRONMENT: A SURVEY Rekha P M 1 and M Dakshayini 2 1 Department of Information Science & Engineering, VTU, JSS academy of technical Education, Bangalore, Karnataka
Monitoring Performances of Quality of Service in Cloud with System of Systems
Monitoring Performances of Quality of Service in Cloud with System of Systems Helen Anderson Akpan 1, M. R. Sudha 2 1 MSc Student, Department of Information Technology, 2 Assistant Professor, Department
BUSINESS MANAGEMENT SUPPORT
BUSINESS MANAGEMENT SUPPORT Business disadvantages using cloud computing? Author: Maikel Mardjan [email protected] 2010 BM-Support.org Foundation. All rights reserved. EXECUTIVE SUMMARY Cloud computing
Storage CloudSim: A Simulation Environment for Cloud Object Storage Infrastructures
Storage CloudSim: A Simulation Environment for Cloud Object Storage Infrastructures http://github.com/toebbel/storagecloudsim [email protected], {foud.jrad, achim.streit}@kit.edu STEINBUCH CENTRE
An Implementation of Load Balancing Policy for Virtual Machines Associated With a Data Center
An Implementation of Load Balancing Policy for Virtual Machines Associated With a Data Center B.SANTHOSH KUMAR Assistant Professor, Department Of Computer Science, G.Pulla Reddy Engineering College. Kurnool-518007,
Geoff Raines Cloud Engineer
Geoff Raines Cloud Engineer Approved for Public Release; Distribution Unlimited. 13-2170 2013 The MITRE Corporation. All rights reserved. Why are P & I important for DoD cloud services? Improves the end-to-end
Sla Aware Load Balancing Algorithm Using Join-Idle Queue for Virtual Machines in Cloud Computing
Sla Aware Load Balancing Using Join-Idle Queue for Virtual Machines in Cloud Computing Mehak Choudhary M.Tech Student [CSE], Dept. of CSE, SKIET, Kurukshetra University, Haryana, India ABSTRACT: Cloud
International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 An Efficient Approach for Load Balancing in Cloud Environment Balasundaram Ananthakrishnan Abstract Cloud computing
VIRTUALIZATION IN CLOUD COMPUTING
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.540
A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing
A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing Liang-Teh Lee, Kang-Yuan Liu, Hui-Yang Huang and Chia-Ying Tseng Department of Computer Science and Engineering,
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,
INTRUSION DETECTION ON CLOUD APPLICATIONS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 9, September 2013,
Dynamic resource management for energy saving in the cloud computing environment
Dynamic resource management for energy saving in the cloud computing environment Liang-Teh Lee, Kang-Yuan Liu, and Hui-Yang Huang Department of Computer Science and Engineering, Tatung University, Taiwan
A Survey on Load Balancing and Scheduling in Cloud Computing
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 7 December 2014 ISSN (online): 2349-6010 A Survey on Load Balancing and Scheduling in Cloud Computing Niraj Patel
Resource Allocation Avoiding SLA Violations in Cloud Framework for SaaS
Resource Allocation Avoiding SLA Violations in Cloud Framework for SaaS Shantanu Sasane Abhilash Bari Kaustubh Memane Aniket Pathak Prof. A. A.Deshmukh University of Pune University of Pune University
ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Analogous
Payment minimization and Error-tolerant Resource Allocation for Cloud System Using equally spread current execution load
Payment minimization and Error-tolerant Resource Allocation for Cloud System Using equally spread current execution load Pooja.B. Jewargi Prof. Jyoti.Patil Department of computer science and engineering,
Cloud Computing: Computing as a Service. Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad
Cloud Computing: Computing as a Service Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad Abstract: Computing as a utility. is a dream that dates from the beginning from the computer
A Comparative Study of Load Balancing Algorithms in Cloud Computing
A Comparative Study of Load Balancing Algorithms in Cloud Computing Reena Panwar M.Tech CSE Scholar Department of CSE, Galgotias College of Engineering and Technology, Greater Noida, India Bhawna Mallick,
Comparison of Various Particle Swarm Optimization based Algorithms in Cloud Computing
Comparison of Various Particle Swarm Optimization based Algorithms in Cloud Computing Er. Talwinder Kaur M.Tech (CSE) SSIET, Dera Bassi, Punjab, India Email- [email protected] Er. Seema Pahwa Department
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON MOBILE APPLICATION IN A CLOUD COMPUTING SECURE AND SCALABLE USING CLOUD
Analysis and Research of Cloud Computing System to Comparison of Several Cloud Computing Platforms
Volume 1, Issue 1 ISSN: 2320-5288 International Journal of Engineering Technology & Management Research Journal homepage: www.ijetmr.org Analysis and Research of Cloud Computing System to Comparison of
A Novel Approach for SLA Compliance Monitoring In Cloud Computing
A Novel Approach for SLA Compliance Monitoring In Cloud Computing *Suneel K S 1, Dr. H S Guruprasad 2 1 PG Scholar, Dept. of CSE, BMSCE, Bangalore 2 Professor and Head, Dept. of CSE, BMSCE, Bangalore Abstract
Round Robin with Server Affinity: A VM Load Balancing Algorithm for Cloud Based Infrastructure
J Inf Process Syst, Vol.9, No.3, September 2013 pissn 1976-913X eissn 2092-805X http://dx.doi.org/10.3745/jips.2013.9.3.379 Round Robin with Server Affinity: A VM Load Balancing Algorithm for Cloud Based
Installing and Administering VMware vsphere Update Manager
Installing and Administering VMware vsphere Update Manager Update 1 vsphere Update Manager 5.1 This document supports the version of each product listed and supports all subsequent versions until the document
International Journal of Engineering Research & Management Technology
International Journal of Engineering Research & Management Technology March- 2015 Volume 2, Issue-2 Survey paper on cloud computing with load balancing policy Anant Gaur, Kush Garg Department of CSE SRM
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS Survey of Optimization of Scheduling in Cloud Computing Environment Er.Mandeep kaur 1, Er.Rajinder kaur 2, Er.Sughandha Sharma 3 Research Scholar 1 & 2 Department of Computer
On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma [email protected] CpE 6510 3/24/2016
On the features and challenges of security and privacy in distributed internet of things C. Anurag Varma [email protected] CpE 6510 3/24/2016 Outline Introduction IoT (Internet of Things) A distributed IoT
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
Exploring Resource Provisioning Cost Models in Cloud Computing
Exploring Resource Provisioning Cost Models in Cloud Computing P.Aradhya #1, K.Shivaranjani *2 #1 M.Tech, CSE, SR Engineering College, Warangal, Andhra Pradesh, India # Assistant Professor, Department
IMPROVEMENT OF RESPONSE TIME OF LOAD BALANCING ALGORITHM IN CLOUD ENVIROMENT
IMPROVEMENT OF RESPONSE TIME OF LOAD BALANCING ALGORITHM IN CLOUD ENVIROMENT Muhammad Muhammad Bala 1, Miss Preety Kaushik 2, Mr Vivec Demri 3 1, 2, 3 Department of Engineering and Computer Science, Sharda
Key Research Challenges in Cloud Computing
3rd EU-Japan Symposium on Future Internet and New Generation Networks Tampere, Finland October 20th, 2010 Key Research Challenges in Cloud Computing Ignacio M. Llorente Head of DSA Research Group Universidad
Efficient and Enhanced Load Balancing Algorithms in Cloud Computing
, pp.9-14 http://dx.doi.org/10.14257/ijgdc.2015.8.2.02 Efficient and Enhanced Load Balancing Algorithms in Cloud Computing Prabhjot Kaur and Dr. Pankaj Deep Kaur M. Tech, CSE P.H.D [email protected],
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
Application Deployment Models with Load Balancing Mechanisms using Service Level Agreement Scheduling in Cloud Computing
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Environments, Services and Network Management for Green Clouds
Environments, Services and Network Management for Green Clouds Carlos Becker Westphall Networks and Management Laboratory Federal University of Santa Catarina MARCH 3RD, REUNION ISLAND IARIA GLOBENET 2012
Keywords: Cloud computing, Characteristics of Cloud computing, Models of Cloud computing, Distance learning, Higher education.
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Analysis of Cloud
