Self Reconfigurable Distributed Load Balancing For Secure and Privacy-Preserving Information Brokering.

Size: px
Start display at page:

Download "Self Reconfigurable Distributed Load Balancing For Secure and Privacy-Preserving Information Brokering."

Transcription

1 Self Reconfigurable Distributed Load Balancing For Secure and Privacy-Preserving Information Brokering. Jyoti More. ME student, Dept of Computer Engg G.H.Raisoni College of Engineering, Savitribai Phule University of Pune, Pune, Maharashtra Urmila Biradar Asst Professor Dept of Computer Engg G.H.Raisoni College of Engineering, Savitribai Phule University of Pune, Pune, Maharashtra Abstract This paper describes concept of Self Recon figurable Distributed Load Balancing as well as secure and privacy preserving information brokering. To implement concept of Self Reconfigurable Distributed Load Balancing, Packet redirection by the server Algorithm is used. To preserve sensitive information Privacy Preserving is used. Information sharing through on-demand access has been increased in organizations (e.g. libraries, enterprise). Information Brokering System (IBS) is distributed system providing data access through set of brokers. The set of brokers are used to make decisions to locate data sources for client queries. A solution to preserve privacy in Information Brokering process of multiple stakeholder is Privacy Preserving Information Brokering(PPIB).To integrates security with query routing have been achieved by automaton segmentation and query segment encryption. The attacker could infer the privacy by two attacks named as correlation attack and inference attack. Load balancing has important impact on performance. In distributed system, load balancing is applied among nodes for redistributing the workload. Load balancing improves resource utilization and response time. Index Terms- Privacy, PPIB, Automaton segmentation, query segment encryption, Load Balancing, distributed system. I. INTRODUCTION Information sharing is becoming increasingly important in recent years, but also within many field ranging from business to other agencies that are becoming more globalized and distributed. To provide efficient large-scale information sharing, to reconcile data heterogeneity and provide interoperability across geographically distributed data sources. The systems work on two extremes of the spectrum: (1) in the query-answering model, peers are fully autonomous but there is no system-wide communication; so that user creates one-to-one client-server connections for information sharing; (2) in the distributed database systems, all the user lost autonomy and are managed by a unified DBMS. In distributed system providing data access through a set of brokers is referred to as Information Brokering System (IBS).This system provide server autonomy and scalability In IBS infrastructure given broker as well as coordinator structure. 30 Jyoti More., Urmila Biradar Fig. 1. overview of the IBS infrastructure

2 There is increasing need for information sharing in recent years, in different organization. In the Information brokering system, there are mainly three types of stakeholder data owner, data provider and data requester. The information is may be different from one another. The main problem has been created by attacker. Attacker could infer privacy of data owner, data provider and data requester. Also introduce problem of system performance. There are mainly two types of attacks: Inference attack and Attributecorrelation attack. Attribute-correlation attack This attack is depending on predicates. Attacker prevents query, which contain predicates. To infer sensitive information, the attacker correlate attributes. This attack is called as the attribute correlation attack. Inference attack This attack is totally based on the guessing the query. if the guess is matches, the query will be inferred. This attack is occurred by finding the location of the data server or the data owner by using the IP address. Need for improving Performance Solution: PPIB has been provided for overcome these attacks. In this way, privacy is preserved. And also Dynamic load balancing algorithm is implemented for improving performance of system. PPIB has been provided for overcome these attacks. In this way, privacy is preserved. And also Dynamic load balancing algorithm is implemented for improving performance of system. II. LITERATURE SURVEY Bo Luo et al.[1] study the privacy protection in information brokering process. they first focus on two attacks: inference attack as well as attribute-correlation attack. Then, they propose a broker-coordinator s t r uc t u r e, as well as two schemes,query segment encryption scheme and automaton segmentation scheme, to share among a set of brokering servers the secure query routing function. With analysis on privacy and scalability, end-to- end performance, they show that the proposed system can integrate query routing while preserving system-wide privacy and security enforcement.they achieve load balancing. A more detailed quantitative comparison of the various architectures would be necessary to have major insights on the tradeoffs of the different mechanisms discussed in this paper. Ms. Pradnya Kamble[8] provides study in Distributed Information Sharing through an automaton segmentation scheme and query segment encryption and data management issues for processing XML data in a p2p setting, namely indexing, replication and query routing and processing. Privacy issues of data and user during the design stage is considered and concluded that existing information brokering systems suffer from a vulnerabilities associated with data privacy, and metadata privacy as well as user privacy,. In this paper, PPIB proposed architecture is discussed, a new approach to preserve privacy in XML information brokering. A. Banu Prabha[3], a new approach propose PPIB,to preserve privacy in XML information brokering,. To preserve privacy of stakeholders involved in information brokering process. The system defines two privacy attacks, namely inference attack and attribute-correlation attack. The Privacy-Preserving Information Brokering in Distributed Information Sharing is achieved by an automaton segmentation scheme and query segment encryption scheme. Valeria Cardellini [9] proposed a classification of existing solutions based on the entity that dispatches the client requests among the distributed Web-servers: client-based, dispatcher-based and DNS-based, serverbased. The different techniques are evaluated primarily with respect to compatibility to Web standards, geographical scalability. III. IMPLEMENTATION A. Existing System 1) Privacy Preserving Information Brokering (PPIB): 31 Jyoti More., Urmila Biradar

3 Architecture of PPIB: Fig. 2. Architecture of PPIB PPIB has mainly three types of brokering components: (a) Brokers (b) Coordinators and (c) Central authority (CA). Broker: Brokers are attached through coordinators. The main function of brokers is for user authentication and query forwarding. Coordinator: Coordinator is responsible for access control and content based query routing. Central Authority: Central Authority is responsible for metadata maintenance and key management. B. Problem of existing System In this system has some existing problem as like site distribution and load balancing. PPIB can suffer from certain load imbalances due to data storing and query routing, load imbalance caused by these factors can be efficiently tackled without substantial performance degradation. However, no load balancing is considered and no explicit results showing query processing costs are reported. [9]. Another problem is drawing an automatic scheme which performs dynamic site distribution. There is a need of consider several other factors such as the workload and trust level of each peer, and privacy disagreement between automaton segments. A scheme that can strike a balance among these factors is a point of consideration. C. Proposed Method 1) Load balancing: Load balancing is the process of redistributing the work load among nodes of the distributed system for improve both job response time and resource utilization.and also avoiding a situation where some nodes are heavily loaded while others are idle or doing little work. Algorithm: The automaton segmentation 32 Jyoti More., Urmila Biradar

4 Deploy Segment () Input: Automaton State St Output: Segment Address: addr 1: for each symbol k in St:StateT ranst able do 2: addr=deploysegment(st:statet ranst able(k):nextstate) 3: DS=createDummyAcceptState() 4: DS:nextState addr 5: St:StateT ranst able(k):nextstate DS 6: end for 7: Seg = createsegment() 8: Seg:addSegment(S) 9: Coordinator = getcoordinator() 10: Coordinator:assignSegment(Seg) 11: return Coordinator:address Server-based approach Packet redirection by the server Distributed Packet Rewriting (DPR) uses a round robin DNS mechanism to carry out the first scheduling of the requests among the Web-servers. The server reached by a client request is able to reroute the connection to another server through a packet rewriting mechanism that, unlike HTTP redirection, is quite transparent to the client. Figure shows the initial request distribution achieved through the DNS (step 1, 1, 2, 3, 3 ) and the case Where the server 1 decides to redirect the received request (step 5, 6) to the server 2 without affecting the client. Two load balancing algorithms are proposed to spread clients requests. The first policy uses a static (stateless) routing function, where the destination server of each packet is determined by a hash function applied to both the sender s IP address and the port number. However, this simple policy is not practicable because IP packet fragmentation does not provide the port information in each fragment. The second stateful algorithm relies on periodic communications among servers about their current load. It tends to redirect the requests to the least loaded server. DPR can be applied to both LAN and WAN distributed Web-server systems. However, the packet rewriting and redirecting mechanism causes a delay that can be high in WAN distributed Web-server systems. D. MATHEMATICAL MODEL MATHEMATICAL MODEL FOR AUTOMATION SEGMENTATION: DS =Dummy accept state Addr =segment address For each K, 33 Jyoti More., Urmila Biradar

5 Create new dummy accept state DS, Addr 1 =DS 1 Addr 2 =DS 2.. Addr k = DS k [S.StateTransTable] i=1 to k =Addr i For each Addr, Create segment S, S=S i S i (coordinator)= S(coordinator) Addr= S i (coordinator).addr MATHEMATICAL MODEL FOR LOAD BALANCING: Let A (i) be the set of jobs assigned to machine Mi; hence the machine Mi needs total computing time Which is known as (Li) load on machine Mi. to minimize makespan is objective of load balancing ; maximum loads on any machine is defined as (T = maxi Ti). This is known as linear programming problem, with objective to Minimize L (load of the corresponding assignment) Minimize L Where Mj M; set of machines to which the job j can be assigned. The finding an assignment of minimum makespan is NP-hard. The solutions can be obtained using a dynamic programming algorithm Where L is the minimum makespan. RESULT We test the system using the application of hospital.the application also containing dataset of Health Dieseas and related information. Following graphs show result of security and Self reconfigurable Load Balancing. Following figure shows that when both servers are busy then user request is wait in waiting queue. 34 Jyoti More., Urmila Biradar

6 Figure : user request wait in waiting queue. Following figure shows the Name of user request which are request to server1. 35 Jyoti More., Urmila Biradar Figure : Name of user request which are request to server1.

7 Following figure shows the Responce of user request. Figure : Responce of user request IV. CONCLUSION This system proposes a new approach for Self reconfigurable load Balancing concept. self reconfigurable load balancing algorithm is implemented for improving performance of system. Load Balancing means redistribute workload among the nodes of distribute system to improve resource utilization and response time. For implementing concept of self reconfigurable load balancing, Packet redirection by the server. This system gives different ways for privacy and security issues. We studied how the privacy and security is maintained. Attacker could infer privacy of data owner, data provider and data requester. Also introduce problem of system performance. There are two types of attacks: inference attack and Attribute-correlation attack are studied. In this paper, we studied PPIB architecture, two novel scheme, and phases of PPIB. V. REFERENCES [1] Bo Luo, Chao-Hsien Chu, Peng Liu Dongwon Lee, Fengjun Li, Enforc- ing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing,in IEEE TRANSCATIONS ON INFORMATION FORENSICS AND SECURITY, [2] F. Li, P. Liu, D. Lee, B. Luo, W. Lee, and P. Mitra, C. Chu, In-broker access control: Towards efficient end-to-end performance of information brokerage systems, in Proc. IEEE SUTC, [3] A Banu Prabha Security Enforcement with query routing Information Brokering in Distributed Information Sharing IOSR-JCE,Issue 2, Vol 16,Ver.XI Mar-Apr 2014 [4] Noe Elisa, K. Suresh Babu SURVEY ON PROTECTING PRIVACY ANDSECURITY IN XML INFORMATION BROKERING IJCSMC, Vol.3, Issue.4 April [5] Ajanta De Sarkar,Soumya Ray, EXECUTION ANALYSIS OF LOAD BALANCING ALGORITHMS IN CLOUD COMPUTING ENVIRON- MENT,in IJCCSA, Vol.2, No.5, October [6] S.S.Apte,Abhijit A. Rajguru,,A Comparative Performance Analysis of Load Balancing Algorithms in Distributed System using Qualitative Parameters Volume-1,Issue-3,August [7] Rima Lingawar,Milind Srode,Mangesh Ghonge,Survey on Load - Balancing Techniques in Cloud ComputingIJARCE,Vol.1,No.3,May 2014 [8] Ms. Pradnya Kamble, Mr. Mukesh Kawatghare, Review on Enforcing Secure And Privacy Preserving Information Brokering In Distributed Information Sharing. [9] Valeria Cardellini and Michele Colajanni, Dynamic Load Balancing on Web-server Systems. 36 Jyoti More., Urmila Biradar

How To Create A Privacy Preserving And Dynamic Load Balancing System In A Distributed System

How To Create A Privacy Preserving And Dynamic Load Balancing System In A Distributed System Enforcing Secure and Privacy-Preserving Information Brokering with Dynamic Load Balancing in Distributed Information Sharing. 1 M.E. Computer Engineering Department GHRCEM, Wagholi, Pune. [email protected]

More information

International Journal of Combined Research & Development (IJCRD ) eissn:2321-225x; pissn:2321-2241 Volume: 2; Issue: 5; May -2014

International Journal of Combined Research & Development (IJCRD ) eissn:2321-225x; pissn:2321-2241 Volume: 2; Issue: 5; May -2014 A REVIEW ON CONTENT AWARE LOAD BALANCING IN CLOUD WEB SERVERS Rajeev Kumar Student, CSE, Institute of Engg & Technology (IET) Alwar, Rajasthan Rajasthan Technical University, Kota, Rajasthan Email Id:

More information

How To Balance A Web Server With Remaining Capacity

How To Balance A Web Server With Remaining Capacity Remaining Capacity Based Load Balancing Architecture for Heterogeneous Web Server System Tsang-Long Pao Dept. Computer Science and Engineering Tatung University Taipei, ROC Jian-Bo Chen Dept. Computer

More information

Development of Software Dispatcher Based. for Heterogeneous. Cluster Based Web Systems

Development of Software Dispatcher Based. for Heterogeneous. Cluster Based Web Systems ISSN: 0974-3308, VO L. 5, NO. 2, DECEMBER 2012 @ SRIMC A 105 Development of Software Dispatcher Based B Load Balancing AlgorithmsA for Heterogeneous Cluster Based Web Systems S Prof. Gautam J. Kamani,

More information

LOAD BALANCING MECHANISMS IN DATA CENTER NETWORKS

LOAD BALANCING MECHANISMS IN DATA CENTER NETWORKS LOAD BALANCING Load Balancing Mechanisms in Data Center Networks Load balancing vs. distributed rate limiting: an unifying framework for cloud control Load Balancing for Internet Distributed Services using

More information

Load Balancing in Structured Peer to Peer Systems

Load Balancing in Structured Peer to Peer Systems Load Balancing in Structured Peer to Peer Systems DR.K.P.KALIYAMURTHIE 1, D.PARAMESWARI 2 Professor and Head, Dept. of IT, Bharath University, Chennai-600 073 1 Asst. Prof. (SG), Dept. of Computer Applications,

More information

EFFICIENCY INFORMATION BROKING SYSTEM SERVICE FOR COORDINATE ROUTING IN CLOUD

EFFICIENCY INFORMATION BROKING SYSTEM SERVICE FOR COORDINATE ROUTING IN CLOUD EFFICIENCY INFORMATION BROKING SYSTEM SERVICE FOR COORDINATE ROUTING IN CLOUD *1 Ms. KalpanaGayathri M., * 2 Mrs. Sangeetha Lakshmi G., * 3 Ms. Siva Sankari A., *1 M.Phil Research Scholar, Department of

More information

Load Balancing in Structured Peer to Peer Systems

Load Balancing in Structured Peer to Peer Systems Load Balancing in Structured Peer to Peer Systems Dr.K.P.Kaliyamurthie 1, D.Parameswari 2 1.Professor and Head, Dept. of IT, Bharath University, Chennai-600 073. 2.Asst. Prof.(SG), Dept. of Computer Applications,

More information

IMPROVED LOAD BALANCING MODEL BASED ON PARTITIONING IN CLOUD COMPUTING

IMPROVED LOAD BALANCING MODEL BASED ON PARTITIONING IN CLOUD COMPUTING Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.

More information

Load Balancing of Web Server System Using Service Queue Length

Load Balancing of Web Server System Using Service Queue Length Load Balancing of Web Server System Using Service Queue Length Brajendra Kumar 1, Dr. Vineet Richhariya 2 1 M.tech Scholar (CSE) LNCT, Bhopal 2 HOD (CSE), LNCT, Bhopal Abstract- In this paper, we describe

More information

A Low Cost Two-tier Architecture Model Implementation for High Availability Clusters For Application Load Balancing

A Low Cost Two-tier Architecture Model Implementation for High Availability Clusters For Application Load Balancing A Low Cost Two-tier Architecture Model Implementation for High Availability Clusters For Application Load Balancing A B M Moniruzzaman 1, Syed Akther Hossain IEEE Department of Computer Science and Engineering

More information

AN EFFICIENT LOAD BALANCING ALGORITHM FOR A DISTRIBUTED COMPUTER SYSTEM. Dr. T.Ravichandran, B.E (ECE), M.E(CSE), Ph.D., MISTE.,

AN EFFICIENT LOAD BALANCING ALGORITHM FOR A DISTRIBUTED COMPUTER SYSTEM. Dr. T.Ravichandran, B.E (ECE), M.E(CSE), Ph.D., MISTE., AN EFFICIENT LOAD BALANCING ALGORITHM FOR A DISTRIBUTED COMPUTER SYSTEM K.Kungumaraj, M.Sc., B.L.I.S., M.Phil., Research Scholar, Principal, Karpagam University, Hindusthan Institute of Technology, Coimbatore

More information

Abstract. 1. Introduction

Abstract. 1. Introduction A REVIEW-LOAD BALANCING OF WEB SERVER SYSTEM USING SERVICE QUEUE LENGTH Brajendra Kumar, M.Tech (Scholor) LNCT,Bhopal 1; Dr. Vineet Richhariya, HOD(CSE)LNCT Bhopal 2 Abstract In this paper, we describe

More information

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing

A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes

More information

Adaptable Load Balancing

Adaptable Load Balancing Adaptable Load Balancing Sung Kim, Youngsu Son, Gaeyoung Lee Home Solution Group Samsung Electronics ABSTRACT The proposed load balancing system includes multiple counts of servers for processing network

More information

Back-End Forwarding Scheme in Server Load Balancing using Client Virtualization

Back-End Forwarding Scheme in Server Load Balancing using Client Virtualization Back-End Forwarding Scheme in Server Load Balancing using Client Virtualization Shreyansh Kumar School of Computing Science and Engineering VIT University Chennai Campus Parvathi.R, Ph.D Associate Professor-

More information

Protagonist International Journal of Management And Technology (PIJMT)

Protagonist International Journal of Management And Technology (PIJMT) Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742 Vol 2 No 3 (May-2015) A Qualitative Approach To Design An Algorithm And Its Implementation For Dynamic Load

More information

Robust and Seamless Control Flow for Load Balancing in Content Delivery Networks

Robust and Seamless Control Flow for Load Balancing in Content Delivery Networks Robust and Seamless Control Flow for Load Balancing in Content Delivery Networks Gopu.Obaiah*1, S.Suresh Babu*2, S.Gopikrishna*3 1*M.Tech Scholar, Dept of CSE, SRI Mittapalli College of Engg, Tummalapalem,

More information

Enhancing MapReduce Functionality for Optimizing Workloads on Data Centers

Enhancing MapReduce Functionality for Optimizing Workloads on Data Centers Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 10, October 2013,

More information

2.2 SIP-based Load Balancing. 3 SIP Load Balancing. 3.1 Proposed Load Balancing Solution. 2 Background Research. 2.1 HTTP-based Load Balancing

2.2 SIP-based Load Balancing. 3 SIP Load Balancing. 3.1 Proposed Load Balancing Solution. 2 Background Research. 2.1 HTTP-based Load Balancing SIP TRAFFIC LOAD BALANCING Ramy Farha School of Electrical and Computer Engineering University of Toronto Toronto, Ontario Email: [email protected] ABSTRACT This paper presents a novel solution to

More information

A Low Cost Two-Tier Architecture Model For High Availability Clusters Application Load Balancing

A Low Cost Two-Tier Architecture Model For High Availability Clusters Application Load Balancing A Low Cost Two-Tier Architecture Model For High Availability Clusters Application Load Balancing A B M Moniruzzaman, StudentMember, IEEE Department of Computer Science and Engineering Daffodil International

More information

OpenFlow Based Load Balancing

OpenFlow Based Load Balancing OpenFlow Based Load Balancing Hardeep Uppal and Dane Brandon University of Washington CSE561: Networking Project Report Abstract: In today s high-traffic internet, it is often desirable to have multiple

More information

Webpage: www.ijaret.org Volume 3, Issue XI, Nov. 2015 ISSN 2320-6802

Webpage: www.ijaret.org Volume 3, Issue XI, Nov. 2015 ISSN 2320-6802 An Effective VM scheduling using Hybrid Throttled algorithm for handling resource starvation in Heterogeneous Cloud Environment Er. Navdeep Kaur 1 Er. Pooja Nagpal 2 Dr.Vinay Guatum 3 1 M.Tech Student,

More information

SPECIAL FEATURES OF TCP/IP NETWORK TRAFFIC AND PROBLEMS OF THE PROGRAM MONITORING. (1)Radi ROMANSKY

SPECIAL FEATURES OF TCP/IP NETWORK TRAFFIC AND PROBLEMS OF THE PROGRAM MONITORING. (1)Radi ROMANSKY 1 SPECIAL FEATURES OF TCP/IP NETWORK TRAFFIC AND PROBLEMS OF THE PROGRAM MONITORING (1)Radi ROMANSKY (1)Department of Computer Systems, Technical University Sofia e-mail address: [email protected] Bulgaria

More information

Load Balancing in Cloud Computing using Observer's Algorithm with Dynamic Weight Table

Load Balancing in Cloud Computing using Observer's Algorithm with Dynamic Weight Table Load Balancing in Cloud Computing using Observer's Algorithm with Dynamic Weight Table Anjali Singh M. Tech Scholar (CSE) SKIT Jaipur, [email protected] Mahender Kumar Beniwal Reader (CSE & IT), SKIT

More information

SHIV SHAKTI International Journal of in Multidisciplinary and Academic Research (SSIJMAR) Vol. 4, No. 3, June 2015 (ISSN 2278 5973)

SHIV SHAKTI International Journal of in Multidisciplinary and Academic Research (SSIJMAR) Vol. 4, No. 3, June 2015 (ISSN 2278 5973) SHIV SHAKTI International Journal of in Multidisciplinary and Academic Research (SSIJMAR) Vol. 4, No. 3, June 2015 (ISSN 2278 5973) Dynamic Load Balancing In Web Server Systems Ms. Rashmi M.Tech. Scholar

More information

A Task-Based Adaptive-TTL approach for Web Server Load Balancing *

A Task-Based Adaptive-TTL approach for Web Server Load Balancing * A Task-Based Adaptive-TTL approach for Web Server Load Balancing * Devarshi Chatterjee Zahir Tari RMIT University School of Computer Science and IT Melbourne, Australia zahirt@cs cs.rmit.edu.au * Supported

More information

Keywords Load balancing, Dispatcher, Distributed Cluster Server, Static Load balancing, Dynamic Load balancing.

Keywords Load balancing, Dispatcher, Distributed Cluster Server, Static Load balancing, Dynamic Load balancing. Volume 5, Issue 7, July 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Hybrid Algorithm

More information

Load Balancing Algorithms for Peer to Peer and Client Server Distributed Environments

Load Balancing Algorithms for Peer to Peer and Client Server Distributed Environments Load Balancing Algorithms for Peer to Peer and Client Server Distributed Environments Sameena Naaz Afshar Alam Ranjit Biswas Department of Computer Science Jamia Hamdard, New Delhi, India ABSTRACT Advancements

More information

A Game Theory Modal Based On Cloud Computing For Public Cloud

A Game Theory Modal Based On Cloud Computing For Public Cloud IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. XII (Mar-Apr. 2014), PP 48-53 A Game Theory Modal Based On Cloud Computing For Public Cloud

More information

Fault-Tolerant Framework for Load Balancing System

Fault-Tolerant Framework for Load Balancing System Fault-Tolerant Framework for Load Balancing System Y. K. LIU, L.M. CHENG, L.L.CHENG Department of Electronic Engineering City University of Hong Kong Tat Chee Avenue, Kowloon, Hong Kong SAR HONG KONG Abstract:

More information

Implementing Parameterized Dynamic Load Balancing Algorithm Using CPU and Memory

Implementing Parameterized Dynamic Load Balancing Algorithm Using CPU and Memory Implementing Parameterized Dynamic Balancing Algorithm Using CPU and Memory Pradip Wawge 1, Pritish Tijare 2 Master of Engineering, Information Technology, Sipna college of Engineering, Amravati, Maharashtra,

More information

High Performance Cluster Support for NLB on Window

High Performance Cluster Support for NLB on Window High Performance Cluster Support for NLB on Window [1]Arvind Rathi, [2] Kirti, [3] Neelam [1]M.Tech Student, Department of CSE, GITM, Gurgaon Haryana (India) [email protected] [2]Asst. Professor,

More information

AN EFFICIENT DISTRIBUTED CONTROL LAW FOR LOAD BALANCING IN CONTENT DELIVERY NETWORKS

AN EFFICIENT DISTRIBUTED CONTROL LAW FOR LOAD BALANCING IN CONTENT DELIVERY NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

Multicast-based Distributed LVS (MD-LVS) for improving. scalability and availability

Multicast-based Distributed LVS (MD-LVS) for improving. scalability and availability Multicast-based Distributed LVS (MD-LVS) for improving scalability and availability Haesun Shin, Sook-Heon Lee, and Myong-Soon Park Internet Computing Lab. Department of Computer Science and Engineering,

More information

Efficient DNS based Load Balancing for Bursty Web Application Traffic

Efficient DNS based Load Balancing for Bursty Web Application Traffic ISSN Volume 1, No.1, September October 2012 International Journal of Science the and Internet. Applied However, Information this trend leads Technology to sudden burst of Available Online at http://warse.org/pdfs/ijmcis01112012.pdf

More information

Utilizing Round Robin Concept for Load Balancing Algorithm at Virtual Machine Level in Cloud Environment

Utilizing Round Robin Concept for Load Balancing Algorithm at Virtual Machine Level in Cloud Environment Utilizing Round Robin Concept for Load Balancing Algorithm at Virtual Machine Level in Cloud Environment Stuti Dave B H Gardi College of Engineering & Technology Rajkot Gujarat - India Prashant Maheta

More information

A Survey on Load Balancing and Scheduling in Cloud Computing

A Survey on Load Balancing and Scheduling in Cloud Computing IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 7 December 2014 ISSN (online): 2349-6010 A Survey on Load Balancing and Scheduling in Cloud Computing Niraj Patel

More information

The International Journal Of Science & Technoledge (ISSN 2321 919X) www.theijst.com

The International Journal Of Science & Technoledge (ISSN 2321 919X) www.theijst.com THE INTERNATIONAL JOURNAL OF SCIENCE & TECHNOLEDGE Efficient Parallel Processing on Public Cloud Servers using Load Balancing Manjunath K. C. M.Tech IV Sem, Department of CSE, SEA College of Engineering

More information

Comparative Analysis of Load Balancing Algorithms in Cloud Computing

Comparative Analysis of Load Balancing Algorithms in Cloud Computing Comparative Analysis of Load Balancing Algorithms in Cloud Computing Ms.NITIKA Computer Science & Engineering, LPU, Phagwara Punjab, India Abstract- Issues with the performance of business applications

More information

SiteCelerate white paper

SiteCelerate white paper SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance

More information

A Comparative Performance Analysis of Load Balancing Algorithms in Distributed System using Qualitative Parameters

A Comparative Performance Analysis of Load Balancing Algorithms in Distributed System using Qualitative Parameters A Comparative Performance Analysis of Load Balancing Algorithms in Distributed System using Qualitative Parameters Abhijit A. Rajguru, S.S. Apte Abstract - A distributed system can be viewed as a collection

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM Macha Arun 1, B.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Holy Mary

More information

Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka. www.ijreat.org

Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka. www.ijreat.org Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks Kruthika S G 1, VenkataRavana Nayak 2, Sunanda Allur 3 1, 2, 3 Department of Computer Science, Visvesvaraya Technological

More information

A Survey on Scalable Data Security and Load Balancing in Multi Cloud Environment

A Survey on Scalable Data Security and Load Balancing in Multi Cloud Environment IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 8 January 2015 ISSN (online): 2349-6010 A Survey on Scalable Data Security and Load Balancing in Multi Cloud

More information

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,

More information

High Availability and Clustering

High Availability and Clustering High Availability and Clustering AdvOSS-HA is a software application that enables High Availability and Clustering; a critical requirement for any carrier grade solution. It implements multiple redundancy

More information

Public Cloud Partition Balancing and the Game Theory

Public Cloud Partition Balancing and the Game Theory Statistics Analysis for Cloud Partitioning using Load Balancing Model in Public Cloud V. DIVYASRI 1, M.THANIGAVEL 2, T. SUJILATHA 3 1, 2 M. Tech (CSE) GKCE, SULLURPETA, INDIA [email protected] [email protected]

More information

A Low Cost Two-Tier Architecture Model for High Availability Clusters Application Load Balancing

A Low Cost Two-Tier Architecture Model for High Availability Clusters Application Load Balancing , pp.89-98 http://dx.doi.org/10.14257/ijgdc.2014.7.1.09 A Low Cost Two-Tier Architecture Model for High Availability Clusters Application Load Balancing A. B. M. Moniruzzaman 1 and Syed Akther Hossain

More information

A Review of Load Balancing Algorithms for Cloud Computing

A Review of Load Balancing Algorithms for Cloud Computing www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -9 September, 2014 Page No. 8297-8302 A Review of Load Balancing Algorithms for Cloud Computing Dr.G.N.K.Sureshbabu

More information

Performance Gathering and Implementing Portability on Cloud Storage Data

Performance Gathering and Implementing Portability on Cloud Storage Data International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 17 (2014), pp. 1815-1823 International Research Publications House http://www. irphouse.com Performance Gathering

More information

Efficient Parallel Distributed Load Balancing in Content Delivery Networks

Efficient Parallel Distributed Load Balancing in Content Delivery Networks Efficient Parallel Distributed Load Balancing in Content Delivery Networks P.Jyothi*1, N.Rajesh*2, K.Ramesh Babu*3 M.Tech Scholar, Dept of CSE, MRECW, Maisammaguda, Secunderabad, Telangana State, India,

More information

Multicast vs. P2P for content distribution

Multicast vs. P2P for content distribution Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution

More information

Toolkit for vulnerability assessment in 3G networks. Kameswari Kotapati The Pennsylvania State University University Park PA 16802

Toolkit for vulnerability assessment in 3G networks. Kameswari Kotapati The Pennsylvania State University University Park PA 16802 Toolkit for vulnerability assessment in 3G networks Kameswari Kotapati The Pennsylvania State University University Park PA 16802 Contents Motivation Solution Overview Methodology Overview 3G Attack Graph

More information

Near Sheltered and Loyal storage Space Navigating in Cloud

Near Sheltered and Loyal storage Space Navigating in Cloud IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata

More information

Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure

Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure White Paper Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure What You Will Learn The new Cisco Application Centric Infrastructure

More information

Load Balancing using DWARR Algorithm in Cloud Computing

Load Balancing using DWARR Algorithm in Cloud Computing IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 12 May 2015 ISSN (online): 2349-6010 Load Balancing using DWARR Algorithm in Cloud Computing Niraj Patel PG Student

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015 RESEARCH ARTICLE OPEN ACCESS Ensuring Reliability and High Availability in Cloud by Employing a Fault Tolerance Enabled Load Balancing Algorithm G.Gayathri [1], N.Prabakaran [2] Department of Computer

More information

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining

More information

An Intrusion Detection System for Kaminsky DNS Cache poisoning

An Intrusion Detection System for Kaminsky DNS Cache poisoning An Intrusion Detection System for Kaminsky DNS Cache poisoning Dhrubajyoti Pathak, Kaushik Baruah Departement of CSE, IIT Guwahati [email protected], [email protected] Abstract : Domain

More information

Lecture 02b Cloud Computing II

Lecture 02b Cloud Computing II Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,

More information

Load balancing using Remote Method Invocation (JAVA RMI)

Load balancing using Remote Method Invocation (JAVA RMI) Load balancing using Remote Method Invocation (JAVA RMI) Ms. N. D. Rahatgaonkar 1, Prof. Mr. P. A. Tijare 2 1 Department of Computer Science & Engg and Information Technology Sipna s College of Engg &

More information

A Comparative Study on Load Balancing Algorithms with Different Service Broker Policies in Cloud Computing

A Comparative Study on Load Balancing Algorithms with Different Service Broker Policies in Cloud Computing A Comparative Study on Load Balancing Algorithms with Different Service Broker Policies in Cloud Computing Sonia Lamba, Dharmendra Kumar United College of Engineering and Research,Allahabad, U.P, India.

More information

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A Review of Anomaly Detection Techniques in Network Intrusion Detection System A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

Monitoring Performances of Quality of Service in Cloud with System of Systems

Monitoring Performances of Quality of Service in Cloud with System of Systems Monitoring Performances of Quality of Service in Cloud with System of Systems Helen Anderson Akpan 1, M. R. Sudha 2 1 MSc Student, Department of Information Technology, 2 Assistant Professor, Department

More information

Load Balancing for Improved Quality of Service in the Cloud

Load Balancing for Improved Quality of Service in the Cloud Load Balancing for Improved Quality of Service in the Cloud AMAL ZAOUCH Mathématique informatique et traitement de l information Faculté des Sciences Ben M SIK CASABLANCA, MORROCO FAOUZIA BENABBOU Mathématique

More information

Virtual Technologies for Learning System. Chao-Wen Chan, Chih-Min Chen. National Taichung University of Science and Technology, Taiwan

Virtual Technologies for Learning System. Chao-Wen Chan, Chih-Min Chen. National Taichung University of Science and Technology, Taiwan Virtual Technologies for Learning System Chao-Wen Chan, Chih-Min Chen 0274 National Taichung University of Science and Technology, Taiwan The Asian Conference on Technology in the Classroom 2012 2012 Abstract:

More information

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN Applicable Version: 10.6.2 onwards Overview Virtual host implementation is based on the Destination NAT concept. Virtual

More information

APV9650. Application Delivery Controller

APV9650. Application Delivery Controller APV9650 D a t a S h e e t Application Delivery Controller Array Networks APV Series of Application Delivery Controllers optimizes the availability, user experience, performance, security and scalability

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 An Efficient Approach for Load Balancing in Cloud Environment Balasundaram Ananthakrishnan Abstract Cloud computing

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh

More information

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving, Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party

More information

A NOVEL LOAD BALANCING STRATEGY FOR EFFECTIVE UTILIZATION OF VIRTUAL MACHINES IN CLOUD

A NOVEL LOAD BALANCING STRATEGY FOR EFFECTIVE UTILIZATION OF VIRTUAL MACHINES IN CLOUD Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.862

More information

Various Schemes of Load Balancing in Distributed Systems- A Review

Various Schemes of Load Balancing in Distributed Systems- A Review 741 Various Schemes of Load Balancing in Distributed Systems- A Review Monika Kushwaha Pranveer Singh Institute of Technology Kanpur, U.P. (208020) U.P.T.U., Lucknow Saurabh Gupta Pranveer Singh Institute

More information

Load balancing in Computer using FCFS algorithm

Load balancing in Computer using FCFS algorithm Load balancing in Computer using FCFS algorithm Kapil Sharma 1, Lokesh Kumar 2 1 M. Tech Scholar, RIEM, Rohtak, Haryana 2 Asst Prof., RIEM, Rohtak, Haryana ABSTRACT Now a day s, everything is going online.

More information

Dynamic Query Updation for User Authentication in cloud Environment

Dynamic Query Updation for User Authentication in cloud Environment Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,

More information

5 Performance Management for Web Services. Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology. [email protected].

5 Performance Management for Web Services. Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology. stadler@ee.kth. 5 Performance Management for Web Services Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology [email protected] April 2008 Overview Service Management Performance Mgt QoS Mgt

More information

Performance Comparison of Server Load Distribution with FTP and HTTP

Performance Comparison of Server Load Distribution with FTP and HTTP Performance Comparison of Server Load Distribution with FTP and HTTP Yogesh Chauhan Assistant Professor HCTM Technical Campus, Kaithal Shilpa Chauhan Research Scholar University Institute of Engg & Tech,

More information

DESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER

DESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE DESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER M.Vishwashanthi 1, S.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Anurag Group

More information

7.1. Remote Access Connection

7.1. Remote Access Connection 7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to

More information

A Survey Study on Monitoring Service for Grid

A Survey Study on Monitoring Service for Grid A Survey Study on Monitoring Service for Grid Erkang You [email protected] ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide

More information

CHAPTER 5 WLDMA: A NEW LOAD BALANCING STRATEGY FOR WAN ENVIRONMENT

CHAPTER 5 WLDMA: A NEW LOAD BALANCING STRATEGY FOR WAN ENVIRONMENT 81 CHAPTER 5 WLDMA: A NEW LOAD BALANCING STRATEGY FOR WAN ENVIRONMENT 5.1 INTRODUCTION Distributed Web servers on the Internet require high scalability and availability to provide efficient services to

More information

Scheduling Allowance Adaptability in Load Balancing technique for Distributed Systems

Scheduling Allowance Adaptability in Load Balancing technique for Distributed Systems Scheduling Allowance Adaptability in Load Balancing technique for Distributed Systems G.Rajina #1, P.Nagaraju #2 #1 M.Tech, Computer Science Engineering, TallaPadmavathi Engineering College, Warangal,

More information

LOAD BALANCING AS A STRATEGY LEARNING TASK

LOAD BALANCING AS A STRATEGY LEARNING TASK LOAD BALANCING AS A STRATEGY LEARNING TASK 1 K.KUNGUMARAJ, 2 T.RAVICHANDRAN 1 Research Scholar, Karpagam University, Coimbatore 21. 2 Principal, Hindusthan Institute of Technology, Coimbatore 32. ABSTRACT

More information

Distributed Database Management Systems for Information Management and Access

Distributed Database Management Systems for Information Management and Access 464 Distributed Database Management Systems for Information Management and Access N Geetha Abstract Libraries play an important role in the academic world by providing access to world-class information

More information

Industrial Network Security and Connectivity. Tunneling Process Data Securely Through Firewalls. A Solution To OPC - DCOM Connectivity

Industrial Network Security and Connectivity. Tunneling Process Data Securely Through Firewalls. A Solution To OPC - DCOM Connectivity Industrial Network Security and Connectivity Tunneling Process Data Securely Through Firewalls A Solution To OPC - DCOM Connectivity Manufacturing companies have invested billions of dollars in industrial

More information

PEER TO PEER FILE SHARING USING NETWORK CODING

PEER TO PEER FILE SHARING USING NETWORK CODING PEER TO PEER FILE SHARING USING NETWORK CODING Ajay Choudhary 1, Nilesh Akhade 2, Aditya Narke 3, Ajit Deshmane 4 Department of Computer Engineering, University of Pune Imperial College of Engineering

More information

DoS: Attack and Defense

DoS: Attack and Defense DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches

More information

Throtelled: An Efficient Load Balancing Policy across Virtual Machines within a Single Data Center

Throtelled: An Efficient Load Balancing Policy across Virtual Machines within a Single Data Center Throtelled: An Efficient Load across Virtual Machines within a Single ata Center Mayanka Gaur, Manmohan Sharma epartment of Computer Science and Engineering, Mody University of Science and Technology,

More information

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. [email protected]

More information

Minimize Response Time Using Distance Based Load Balancer Selection Scheme

Minimize Response Time Using Distance Based Load Balancer Selection Scheme Minimize Response Time Using Distance Based Load Balancer Selection Scheme K. Durga Priyanka M.Tech CSE Dept., Institute of Aeronautical Engineering, HYD-500043, Andhra Pradesh, India. Dr.N. Chandra Sekhar

More information

INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY

INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY Asst.Prof. S.N.Wandre Computer Engg. Dept. SIT,Lonavala University of Pune, [email protected] Gitanjali Dabhade Monika Ghodake Gayatri

More information