SOCIAL PRIVATE CLOUD COMPUTING FOR HIGHER SECURE VIRTUAL PROCESSING

Size: px
Start display at page:

Download "SOCIAL PRIVATE CLOUD COMPUTING FOR HIGHER SECURE VIRTUAL PROCESSING"

Transcription

1 SOCIAL PRIVATE CLOUD COMPUTING FOR HIGHER SECURE VIRTUAL PROCESSING 1 RAYAN JAHA, 2 NAVRATI SAXENA, 3 JAMILAH JAHA 1,2,3 Collage of Information and Communication Engineering, Sungkyunkwan University, Suwon, Korea Abstract- There are many users in the universities who need more computational power than they own, on the other hand there are some other users who use less computational power than they own, also there are some wasted computer resources not being used at all such as idle computers in libraries, labs, classrooms, etc. By interconnecting all these computers to a network manager, we can create one large scale computing resource (private cloud) used for virtual processing with a high throughput computing. However, the only thing that stops the users to share them computational resources is trust. In this paper we propose a system that prevent the user from these security overheads, by creating social private cloud computing. Index Terms- Cloud computing, Network Security, Social networks, Virtual processing. I. INTRODUCTION High throughput computing on large groups of distributed owned computing resources has existed for a long time. Only few users allow a stranger (random professor or a student) to use their computational power. Even if data encrypted, there is always a way. Basically, users who want to process data virtually they have no guarantee of data protection, which means that they have to trust them in order to process them data. Therefore, the important factor here is the trust. We are looking for a way to deduce a level of trust between users here for instance, a friendship. Trust is a very important factor in cloud computing but the question is how can users trust each others? to answer this question we need to understand how to build up a trust. Trust is usually built up during real life relationships. For example a known student or a friend, or even professors. By taking all these relationships to the digital level we created digital social networks, similar to Facebook, Google plus, etc. They are digital relationships websites, some of these relations started from the beginning, in a digital world; it could be from online gamming, forums, etc. However, most of these relations based on a real life relations. Commonly in these examples, the users create an account then add people; he/she may know from his/her real life to the friends list. We took the leverage of these digital social networks to improve the security overheads regarding virtual processing. By building the trust between users, will make them use our system, because users are more likely to trust his/her friend or a professor, which eventually leads to high throughout private cloud computing. In particular, this paper we propose a private cloud computing system for a university based on Trust. By using the web application that the university provides, to invite other users based on real relationship and process the data virtually. Specific contributions of our work are summarized below: We design a new private cloud computing based on real life relationships to increase the number of users which will eventually lead to higher throughput computing. Our system allows the user to describe the job he/she wants to get it done. Then the network manager matches the best resources that match the job. The system we designed is taking the advantage of the idle computers, which are wasting computational resources. The rest of the paper is organized as follows: Section 2 states the structure of our system. In Section 3, system scenarios will be discussed. Finally, section 4 concludes the paper remarks. II. SYSTEM DESIGN Creating the system is very simple; briefly, we divide it into two parts. First part is creating the private cloud, by sharing all the available computational resources in the university to build one large-scale computational resource. Then, for the second part we create social networks between the users. We combine them together to get social private cloud computing. Basically, the university provides virtual processing and social networking web application that accomplishes these tasks. In between, it also creates and schedules jobs as well. A. Creating private Cloud 1) Cloud Architecture To create the cloud we should link all the computers in the university to a network manager, which will create a large environment of heterogeneous resources. Fig. 1 shows the basic architecture and every computer where it can come from. 105

2 Social Private Cloud Computing for Higher Secure Virtual Processing allocate worker computer with higher priority to trusted group first which is intended to his friends. Fig. 1. Network Architecture a) Network Manager Network manager is the central computer; from which all computers are connected to manage them. Network manager, is responsible for job queuing and job assigning to the worker computers whether it is idle or not. It is also responsible to keep tracking the status of these jobs after assigning them. Network manager has the ability to match the job based on the description that user makes. For example, if the user wants to execute the job on matlab, then the user must describe that, and then the network manager will match the worker computer that has matlab. b) Worker Computers Worker computers are those, which provide the computational power for the system, the more we have the more computational power we get. There are two types of worker computer: (1) Public Worker Computer These types of computers do not have an owner, such as the computers in the libraries, classrooms, printer computers and browsing computers. These computers are turned on almost all the time; also, they remain idle most of the time. Public worker computers are configured only to receive jobs from the network manager; which means that it will always accept the job once it receives it. Since these computers are public, which means, anyone can use it, therefore leading to higher risk to process the data virtually on it. However, using these computers, it requires the university identification number, which is provided by the university itself to every student and professor just make sure the system knows who is using the computers. If it is still risky to use, make some policies. Assign non-important jobs only when the worker machine is in idle state. For example, if there is a student who need to execute non-important code. While the student submitting the job and describe it, as a non-important job, then the network manager based on the job description, will allocate the worker computer. Which in this case primarily, it will try to find private worker computer and if it did not find any then it will look for a public worker that stated as an idle. Fig. 2 shows how the network manager will Fig. 2. Non-important Jobs (2) Private Worker Computer Private worker computer mean that every computer has an owner either a student or a professor. They also have to log in with the university identification number for more authentication concerns. Private worker computers has the ability to place jobs in the network manager s queue, after that network manager will allocate the matched worker computer and get them execute, and they also has the ability to receive jobs from the network manager that needed to be execute on their computer in return. Which is mean everyone has to share their resources unless they need it. The user can only assign jobs to the network manager if more resources needed than the user has. B. Build social networks The platform of social networks is provided by the web application, which the university provides. In the traditional social networks cannot guarantee a specific profile is linked to the real person, taking for example, Facebook is not able to guarantee this profile it linked to the real person who is pretending to be. To guarantee profiles are linked to real persons, we proposed login with the university identification, which is usually issued after submitting some official documents. 106

3 The web application has the ability to invite a friend. When someone adds a friend, the user has some knowledge of the friend who has added and this kind of relation starts from a real life. For an instance, they could classmates or the user could be a professor of another user. However, the invitation does not describe the level of trust between these users whether the user is a student or a professor. Therefore, the web application provides the ability to create groups for the individual to describe the level of trust based on the relation in a real life. For example, the user just invited a very close friend whom they know each other for a long time and they also trust each other, then the user adds the friend to close friend group. In the other hand, a user just invites someone whom he meets in the class, and then the user adds the friend to a group that has a sharing limitation. Different sharing policies depends on the group, for instance a user from close friends group is more likely to share resources openly, however might not be true for a friend who just met. In Fig.3 the spotted student has three students and two professors who can trust, however the student also got one student who just met and not fully trusted. Social Private Cloud Computing for Higher Secure Virtual Processing students. Let us assume Mr. A s work research require less computational power than he has. On the other hand, Mr. B s work needs more computational power than he has. This is what our system for. We have trusted users who need virtual processing. In willing to use the system they both have to log in to the university web application with student identification number, Mr. A or Mr. B sends a friend request and the other accepts it. Now they have digital friendship, they make a group and add him to that group; for example, he creates a group to add people who he really trusts. We finished with the first step, which is creating social network. The next part, is borrowing a resource from a friend for virtual processing. Since Mr. A doesn t need his full resources, he can configure his account to receive jobs. The status of Mr. A will be sent to the network manager. In the other side there is Mr. B who needs more resource, he creates the file and sends it to the network manager. Network manager will receive the job and put it in the queue. In case the queue is empty, the network manager will update its worker computers status and relations and as soon network manager finds a worker computer (in this case is Mr. A s computer) it will assign the job to Mr. A s computer and keep tracking job s status and return it when it is done. III. SCENARIOS Figure 3 Social Networks There are different scenarios depending on the situations and the ability we are talking about. We will start with the basic one, which will include the goal of the paper. C. Basic Scenario In order to make the system work, two users must have a relationship in real life, any kind of a relationship whether a student with another student or a student with a professor or even a professor with a professor. Let us assume Mr. A and Mr. B are friends from high school, and they trust each other. Mr. A and Mr. B are both a master degree D. Job Description Job description is the ability to improve the performance of the system. In case the user wants to execute a file that requires a specific program, then the user must mention it in the description and after sending the job to the network manager, the allocator will match it with a worker computer regarding to the description. For example, a user want to execute an X-code file then the user must mention that, in the description. After that the user sends the file to the network manager, then the allocator will match the information he gave with a worker computer s that have X-code installed. In Fig. 4 the above example has been explained, where four of his friends are ready to share them resources. However, some of them have different operation systems, Xcode only work in Mac environment, there are two friends who are using Mac operation system, but only one of them have the Xcode installed. Which is the one that network manager has been allocated. Job description also could be use to choose a specific group only to search for a worker computer. E. Idle Computers Idle computers is a good idea, because there are lot of idle computers all over the university and beside wasting these computational resources, it is advisable to use them. Since there are more worker computers, we will have more free resources that we can use. In public worker computers, we only use them when they are idle, we also could use private idle computers as 107

4 well expressed in Fig 2. In case, the user has non-important job is to be done. The user must send the job to the network manager as a non-important, and supposing that there is none of his/her social network user is sharing at the moment. Public computer will be allocated if and only if it stays an idle. Social Private Cloud Computing for Higher Secure Virtual Processing F. Policies Polices is almost similar to the job description, the different is that the job description managed by the sender, and the policies is managed by the receiver. There are several scenarios, for example the worker which configured to share its resource at the moment could make a policy stating that a job can be received from this group only, or only if the receiver is an idle, or even it can specifies the time to receive jobs, for instance Mr. A leave the lab at 6 p.m. and return next day at 10 a.m. any job received between 6 pm to 8 am is accepted. Fig. 4. Job Description G. Overall Scenario In this scenario, we try to explain the highest priority. In order, network manager allocate a worker computer. The higher priorities have higher security than lower priorities. Always the network manager will allocate highest trusted group as a first step then it will look for idle computers. For example if the user has different groups, the highest trusted group will be chosen. Also, from the highest trusted group, it will try to find idle computers first. Fig 5. Fig. 5. Overall Scenario CONCLUSION In this paper, we have proposed a social private cloud computing system to overcome the security overheads, which is a combination of virtual cloud processing and social networks. In our system, we have used all computers in the university as resources, in order to create one large-scale computational power and taking the leverage of the public computers while it is in idle mode and private computers for more secure data processing. We have taken the leverage of real life relationships and converted it to digital relationship based on trust, and used that trusted relationship to secure virtual processing between worker computers. The more secure computing will lead to more users to share their computational resources, which will lead to more efficient and higher throughput computing. REFERENCES [1] S. Chen, B. Mulgrew, and P. M. Grant, A clustering technique for digital communications channel equalization using radial basis function networks, IEEE Trans. on Neural Networks, vol. 4, pp , July K. Chard, k. Bubendorfer, S. Caton and O. F. Rana, Social Cloud Computing: A Vision for Socially Motivated Resource Sharing, Services Computing IEEE Transactions, vol. 5, no. 4, October-December

5 Social Private Cloud Computing for Higher Secure Virtual Processing [2] Ellison, N. B., Steinfield, C. and Lampe, C. (2007), The Benefits of Facebook Friends: Social Capital and College Students Use of Online Social Network Sites. Journal of Computer-Mediated Communication, 12: doi: /j [3] R. Raman, M. Livny, M. Solomon, Matchmaking: Distributed Resource Management for High Throughput Computing, IEEE International Symposium on High Performance Distributed Computing. [4] S. Taylor, High Performance Computing of Hydrologic Models Using HTCondor, Brigham Young University, April [5] D. Warneke, O. Kao, "Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud, IEEE transactions on Parallel and Distributed Systems, VOL. 22, NO. 6, JUNE

IMPROVED FAIR SCHEDULING ALGORITHM FOR TASKTRACKER IN HADOOP MAP-REDUCE

IMPROVED FAIR SCHEDULING ALGORITHM FOR TASKTRACKER IN HADOOP MAP-REDUCE IMPROVED FAIR SCHEDULING ALGORITHM FOR TASKTRACKER IN HADOOP MAP-REDUCE Mr. Santhosh S 1, Mr. Hemanth Kumar G 2 1 PG Scholor, 2 Asst. Professor, Dept. Of Computer Science & Engg, NMAMIT, (India) ABSTRACT

More information

An in-building multi-server cloud system based on shortest Path algorithm depending on the distance and measured Signal strength

An in-building multi-server cloud system based on shortest Path algorithm depending on the distance and measured Signal strength IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. I (Jan Feb. 2015), PP 38-42 www.iosrjournals.org An in-building multi-server cloud system based

More information

Fair Scheduling Algorithm with Dynamic Load Balancing Using In Grid Computing

Fair Scheduling Algorithm with Dynamic Load Balancing Using In Grid Computing Research Inventy: International Journal Of Engineering And Science Vol.2, Issue 10 (April 2013), Pp 53-57 Issn(e): 2278-4721, Issn(p):2319-6483, Www.Researchinventy.Com Fair Scheduling Algorithm with Dynamic

More information

IMPROVING QUALITY OF VIDEOS IN VIDEO STREAMING USING FRAMEWORK IN THE CLOUD

IMPROVING QUALITY OF VIDEOS IN VIDEO STREAMING USING FRAMEWORK IN THE CLOUD IMPROVING QUALITY OF VIDEOS IN VIDEO STREAMING USING FRAMEWORK IN THE CLOUD R.Dhanya 1, Mr. G.R.Anantha Raman 2 1. Department of Computer Science and Engineering, Adhiyamaan college of Engineering(Hosur).

More information

Grid Computing Approach for Dynamic Load Balancing

Grid Computing Approach for Dynamic Load Balancing International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-1 E-ISSN: 2347-2693 Grid Computing Approach for Dynamic Load Balancing Kapil B. Morey 1*, Sachin B. Jadhav

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 An Efficient Approach for Load Balancing in Cloud Environment Balasundaram Ananthakrishnan Abstract Cloud computing

More information

How To Collaborate On A Project Plan 365 Plan On A Pcode On A Microsoft Project World On A Macbook Or Ipad Or Ipa Or Ipam Or Ipat Or Ipar Or Ipor Or Ipro Or Ipo Or Ip

How To Collaborate On A Project Plan 365 Plan On A Pcode On A Microsoft Project World On A Macbook Or Ipad Or Ipa Or Ipam Or Ipat Or Ipar Or Ipor Or Ipro Or Ipo Or Ip Project Plan 365 Collaboration with Microsoft Project Files (MPP) in SharePoint cloud White Paper Housatonic Software - Project Plan 365 App 2014 Contents 1. Introduction... 3 2. Prerequisites... 4 3.

More information

Advanced Peer to Peer Discovery and Interaction Framework

Advanced Peer to Peer Discovery and Interaction Framework Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 peeyush_tugnawat@jdedwards.com Mohamed E. Fayad Computer Engineering

More information

Project Plan 365 Collaboration with Microsoft Project Files (MPP) in OneDrive cloud

Project Plan 365 Collaboration with Microsoft Project Files (MPP) in OneDrive cloud Project Plan 365 Collaboration with Microsoft Project Files (MPP) in OneDrive cloud White Paper Housatonic Software - Project Plan 365 App 2014 Contents 1. Introduction... 3 2. Prerequisites... 4 3. What

More information

Logging in to Google Chrome

Logging in to Google Chrome Logging in to Google Chrome By logging in to Google Chrome, you will be able to quickly access any saved applications, bookmarks, and resources from any location. Please remember...if you are using a lab

More information

Project Plan 365 Collaboration with Microsoft Project Files (MPP) in Dropbox cloud

Project Plan 365 Collaboration with Microsoft Project Files (MPP) in Dropbox cloud Project Plan 365 Collaboration with Microsoft Project Files (MPP) in Dropbox cloud White Paper Housatonic Software - Project Plan 365 App 2014 Contents 1. Introduction... 3 2. Prerequisites... 4 3. What

More information

The Improved Job Scheduling Algorithm of Hadoop Platform

The Improved Job Scheduling Algorithm of Hadoop Platform The Improved Job Scheduling Algorithm of Hadoop Platform Yingjie Guo a, Linzhi Wu b, Wei Yu c, Bin Wu d, Xiaotian Wang e a,b,c,d,e University of Chinese Academy of Sciences 100408, China b Email: wulinzhi1001@163.com

More information

XMPP A Perfect Protocol for the New Era of Volunteer Cloud Computing

XMPP A Perfect Protocol for the New Era of Volunteer Cloud Computing International Journal of Computational Engineering Research Vol, 03 Issue, 10 XMPP A Perfect Protocol for the New Era of Volunteer Cloud Computing Kamlesh Lakhwani 1, Ruchika Saini 1 1 (Dept. of Computer

More information

AN EFFICIENT LOAD BALANCING APPROACH IN CLOUD SERVER USING ANT COLONY OPTIMIZATION

AN EFFICIENT LOAD BALANCING APPROACH IN CLOUD SERVER USING ANT COLONY OPTIMIZATION AN EFFICIENT LOAD BALANCING APPROACH IN CLOUD SERVER USING ANT COLONY OPTIMIZATION Shanmuga Priya.J 1, Sridevi.A 2 1 PG Scholar, Department of Information Technology, J.J College of Engineering and Technology

More information

Clearing Away the Clouds: Cloud Computing at Stanford

Clearing Away the Clouds: Cloud Computing at Stanford Clearing Away the Clouds: Cloud Computing at Stanford Tech Briefing Turing Auditorium, 1/29/2010 Phil Reese, IT Services Topics: A walk down memory lane, which leads to the clouds. A chair with four legs.

More information

Cloud Computing Services and its Application

Cloud Computing Services and its Application Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 1 (2014), pp. 107-112 Research India Publications http://www.ripublication.com/aeee.htm Cloud Computing Services and its

More information

A Load Balancing Model Based on Cloud Partitioning for the Public Cloud

A Load Balancing Model Based on Cloud Partitioning for the Public Cloud IEEE TRANSACTIONS ON CLOUD COMPUTING YEAR 2013 A Load Balancing Model Based on Cloud Partitioning for the Public Cloud Gaochao Xu, Junjie Pang, and Xiaodong Fu Abstract: Load balancing in the cloud computing

More information

Public Cloud Partition Balancing and the Game Theory

Public Cloud Partition Balancing and the Game Theory Statistics Analysis for Cloud Partitioning using Load Balancing Model in Public Cloud V. DIVYASRI 1, M.THANIGAVEL 2, T. SUJILATHA 3 1, 2 M. Tech (CSE) GKCE, SULLURPETA, INDIA v.sridivya91@gmail.com thaniga10.m@gmail.com

More information

AVI Nutrition Application

AVI Nutrition Application AVI Nutrition Application Software Project Management Plan 3WSPMP.doc Final April 17, 2013 Three W 3WSPMP.doc Page i Revisions Version Draft 1.0 Primary Author(s) Gus Delawder, Matt Amabeli Description

More information

Advisor Guide. www.grades First.com 1/2/13

Advisor Guide. www.grades First.com 1/2/13 2012 Advisor Guide www.grades First.com 1/2/13 Table of Contents Introduction. 1 Links and Support. 1 Mass Edit of Students 2-4 Home Tab... 5-9 Appointment Campaign 9-16 Home tab (Continued) 16-17 Search

More information

A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster

A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster , pp.11-20 http://dx.doi.org/10.14257/ ijgdc.2014.7.2.02 A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster Kehe Wu 1, Long Chen 2, Shichao Ye 2 and Yi Li 2 1 Beijing

More information

IMPROVED LOAD BALANCING MODEL BASED ON PARTITIONING IN CLOUD COMPUTING

IMPROVED LOAD BALANCING MODEL BASED ON PARTITIONING IN CLOUD COMPUTING Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.

More information

Security Issues with Sharing (Cloud Storage Services) Kalyani Haridasyam EECS710: Information Security and Assurance University of Kansas

Security Issues with Sharing (Cloud Storage Services) Kalyani Haridasyam EECS710: Information Security and Assurance University of Kansas Security Issues with Sharing (Cloud Storage Services) Kalyani Haridasyam EECS710: Information Security and Assurance University of Kansas Topics Introduction Data Sharing Dropbox and Sharing Dropbox Security

More information

Cloud Computing in Medical Diagnosis for improving Health Care Environment

Cloud Computing in Medical Diagnosis for improving Health Care Environment Cloud Computing in Medical Diagnosis for improving Health Care Environment Dr.V.Jeyabalaraja 1,Dr.M.S.Josephine 2 1 Professor, Velammal Engineering College, 2 Professor, Dr.MGR University, jeyabalaraja@gmail.com,

More information

A SURVEY PAPER ON ENSURING SECURITY IN CLOUD COMPUTING

A SURVEY PAPER ON ENSURING SECURITY IN CLOUD COMPUTING A SURVEY PAPER ON ENSURING SECURITY IN CLOUD COMPUTING Yogita gangboir 1, Praveen Shende 2, Tushar Kumar Vaidya 3 1,3 Department of Computer Science and Engineering, CSIT, Durg, (India) 2 Assoistant Professor

More information

The International Journal Of Science & Technoledge (ISSN 2321 919X) www.theijst.com

The International Journal Of Science & Technoledge (ISSN 2321 919X) www.theijst.com THE INTERNATIONAL JOURNAL OF SCIENCE & TECHNOLEDGE Efficient Parallel Processing on Public Cloud Servers using Load Balancing Manjunath K. C. M.Tech IV Sem, Department of CSE, SEA College of Engineering

More information

Context-aware cloud computing for HEP

Context-aware cloud computing for HEP Department of Physics and Astronomy, University of Victoria, Victoria, British Columbia, Canada V8W 2Y2 E-mail: rsobie@uvic.ca The use of cloud computing is increasing in the field of high-energy physics

More information

CLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM

CLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM CLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM Taha Chaabouni 1 and Maher Khemakhem 2 1 MIRACL Lab, FSEG, University of Sfax, Sfax, Tunisia chaabounitaha@yahoo.fr 2 MIRACL Lab, FSEG, University

More information

Leasing in a Market for Computing Capacity

Leasing in a Market for Computing Capacity Leasing in a Market for Computing Capacity Spyros Lalis and Alexandros Karipidis Computer Science Dept., University of Crete, Hellas {lalis,karipid}@csd.uoc.gr Institute of Computer Science, Foundation

More information

The Power Marketing Information System Model Based on Cloud Computing

The Power Marketing Information System Model Based on Cloud Computing 2011 International Conference on Computer Science and Information Technology (ICCSIT 2011) IPCSIT vol. 51 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V51.96 The Power Marketing Information

More information

Performance Gathering and Implementing Portability on Cloud Storage Data

Performance Gathering and Implementing Portability on Cloud Storage Data International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 17 (2014), pp. 1815-1823 International Research Publications House http://www. irphouse.com Performance Gathering

More information

Simple. Serverless. Secure. { Secure Cloud Printing for Business }

Simple. Serverless. Secure. { Secure Cloud Printing for Business } Simple. Serverless. Secure. { Secure Cloud Printing for Business } Secure Cloud Printing for Business Cloud services can transform how today's businesses work, optimizing processes while reducing capital

More information

Resource Scalability for Efficient Parallel Processing in Cloud

Resource Scalability for Efficient Parallel Processing in Cloud Resource Scalability for Efficient Parallel Processing in Cloud ABSTRACT Govinda.K #1, Abirami.M #2, Divya Mercy Silva.J #3 #1 SCSE, VIT University #2 SITE, VIT University #3 SITE, VIT University In the

More information

Fax User Guide 07/31/2014 USER GUIDE

Fax User Guide 07/31/2014 USER GUIDE Fax User Guide 07/31/2014 USER GUIDE Contents: Access Fusion Fax Service 3 Search Tab 3 View Tab 5 To E-mail From View Page 5 Send Tab 7 Recipient Info Section 7 Attachments Section 7 Preview Fax Section

More information

Cloud Computing Backgrounder

Cloud Computing Backgrounder Cloud Computing Backgrounder No surprise: information technology (IT) is huge. Huge costs, huge number of buzz words, huge amount of jargon, and a huge competitive advantage for those who can effectively

More information

Efficient Data Replication Scheme based on Hadoop Distributed File System

Efficient Data Replication Scheme based on Hadoop Distributed File System , pp. 177-186 http://dx.doi.org/10.14257/ijseia.2015.9.12.16 Efficient Data Replication Scheme based on Hadoop Distributed File System Jungha Lee 1, Jaehwa Chung 2 and Daewon Lee 3* 1 Division of Supercomputing,

More information

Single Sign-On Secure Authentication Password Mechanism

Single Sign-On Secure Authentication Password Mechanism Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,

More information

Energy Constrained Resource Scheduling for Cloud Environment

Energy Constrained Resource Scheduling for Cloud Environment Energy Constrained Resource Scheduling for Cloud Environment 1 R.Selvi, 2 S.Russia, 3 V.K.Anitha 1 2 nd Year M.E.(Software Engineering), 2 Assistant Professor Department of IT KSR Institute for Engineering

More information

A Survey on Load Balancing and Scheduling in Cloud Computing

A Survey on Load Balancing and Scheduling in Cloud Computing IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 7 December 2014 ISSN (online): 2349-6010 A Survey on Load Balancing and Scheduling in Cloud Computing Niraj Patel

More information

Towards Integrating Information of Service Level Agreement and Resources as a Services (RaaS) for Cloud Computing Environment

Towards Integrating Information of Service Level Agreement and Resources as a Services (RaaS) for Cloud Computing Environment Towards Integrating Information of Service Level Agreement and Resources as a Services (RaaS) for Cloud Computing Environment Rusli Abdullah and Amir Mohamed Talib Faculty of Computer Science & IT Information

More information

MULTI-DOMAIN CLOUD SOCIAL NETWORK SERVICE PLATFORM SUPPORTING ONLINE COLLABORATIONS ON CAMPUS

MULTI-DOMAIN CLOUD SOCIAL NETWORK SERVICE PLATFORM SUPPORTING ONLINE COLLABORATIONS ON CAMPUS MULTI-DOMAIN CLOUD SOCIAL NETWORK SERVICE PLATFORM SUPPORTING ONLINE COLLABORATIONS ON CAMPUS Zhao Du, Xiaolong Fu, Can Zhao, Ting Liu, Qifeng Liu, Qixin Liu Information Technology Center, Tsinghua University,

More information

Cloud Computing for Agent-based Traffic Management Systems

Cloud Computing for Agent-based Traffic Management Systems Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion

More information

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Kirill Krinkin Open Source and Linux lab Saint Petersburg, Russia kirill.krinkin@fruct.org Eugene Kalishenko Saint Petersburg

More information

Reverse Auction-based Resource Allocation Policy for Service Broker in Hybrid Cloud Environment

Reverse Auction-based Resource Allocation Policy for Service Broker in Hybrid Cloud Environment Reverse Auction-based Resource Allocation Policy for Service Broker in Hybrid Cloud Environment Sunghwan Moon, Jaekwon Kim, Taeyoung Kim, Jongsik Lee Department of Computer and Information Engineering,

More information

Comparison of PBRR Scheduling Algorithm with Round Robin and Heuristic Priority Scheduling Algorithm in Virtual Cloud Environment

Comparison of PBRR Scheduling Algorithm with Round Robin and Heuristic Priority Scheduling Algorithm in Virtual Cloud Environment www.ijcsi.org 99 Comparison of PBRR Scheduling Algorithm with Round Robin and Heuristic Priority Scheduling Algorithm in Cloud Environment Er. Navreet Singh 1 1 Asst. Professor, Computer Science Department

More information

Evaluation of different Open Source Identity management Systems

Evaluation of different Open Source Identity management Systems Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems

More information

Task Scheduling in Hadoop

Task Scheduling in Hadoop Task Scheduling in Hadoop Sagar Mamdapure Munira Ginwala Neha Papat SAE,Kondhwa SAE,Kondhwa SAE,Kondhwa Abstract Hadoop is widely used for storing large datasets and processing them efficiently under distributed

More information

Various Schemes of Load Balancing in Distributed Systems- A Review

Various Schemes of Load Balancing in Distributed Systems- A Review 741 Various Schemes of Load Balancing in Distributed Systems- A Review Monika Kushwaha Pranveer Singh Institute of Technology Kanpur, U.P. (208020) U.P.T.U., Lucknow Saurabh Gupta Pranveer Singh Institute

More information

The Load Balancing Strategy to Improve the Efficiency in the Public Cloud Environment

The Load Balancing Strategy to Improve the Efficiency in the Public Cloud Environment The Load Balancing Strategy to Improve the Efficiency in the Public Cloud Environment Majjaru Chandra Babu Assistant Professor, Priyadarsini College of Engineering, Nellore. Abstract: Load balancing in

More information

Cloud-based Distribute Processing of User-Customized Mobile Interface in U-Sensor Network Environment

Cloud-based Distribute Processing of User-Customized Mobile Interface in U-Sensor Network Environment , pp.18-22 http://dx.doi.org/10.14257/astl.2013.42.05 Cloud-based Distribute Processing of User-Customized Mobile Interface in U-Sensor Network Environment Changhee Cho 1, Sanghyun Park 2, Jadhav Yogiraj

More information

Installation, Licensing, and Activation License Administration Guide

Installation, Licensing, and Activation License Administration Guide Installation, Licensing, and Activation License Administration Guide R2015b How to Contact MathWorks Latest news: www.mathworks.com Sales and services: www.mathworks.com/sales_and_services User community:

More information

E-mail Encryption Guide version 1.2, by Thomas Reed

E-mail Encryption Guide version 1.2, by Thomas Reed E-mail Encryption Guide version 1.2, by Thomas Reed In order for two people to send and receive encrypted e-mails to/from each other, both parties need: An e-mail reader that supports encryption (such

More information

Effective Meeting Strategies

Effective Meeting Strategies Effective Meeting Strategies The effectiveness of an organization s meetings can determine how successful an organization will become. Effective meetings allow the officers and the members discuss issues,

More information

How To Secure Cloud Computing

How To Secure Cloud Computing Resilient Cloud Services By Hemayamini Kurra, Glynis Dsouza, Youssif Al Nasshif, Salim Hariri University of Arizona First Franco-American Workshop on Cybersecurity 18 th October, 2013 Presentation Outline

More information

A survey on cost effective multi-cloud storage in cloud computing

A survey on cost effective multi-cloud storage in cloud computing A survey on cost effective multi-cloud storage in cloud computing Nitesh Shrivastava, Ganesh Kumar Abstract As novel storage model, cloud storage has gain attentions from both the academics and industrial

More information

A Framework for the Design of Cloud Based Collaborative Virtual Environment Architecture

A Framework for the Design of Cloud Based Collaborative Virtual Environment Architecture , March 12-14, 2014, Hong Kong A Framework for the Design of Cloud Based Collaborative Virtual Environment Architecture Abdulsalam Ya u Gital, Abdul Samad Ismail, Min Chen, and Haruna Chiroma, Member,

More information

Email: shravankumar.elguri@gmail.com. 2 Prof, Dept of CSE, Institute of Aeronautical Engineering, Hyderabad, Andhrapradesh, India,

Email: shravankumar.elguri@gmail.com. 2 Prof, Dept of CSE, Institute of Aeronautical Engineering, Hyderabad, Andhrapradesh, India, www.semargroup.org, www.ijsetr.com ISSN 2319-8885 Vol.03,Issue.06, May-2014, Pages:0963-0968 Improving Efficiency of Public Cloud Using Load Balancing Model SHRAVAN KUMAR 1, DR. N. CHANDRA SEKHAR REDDY

More information

Project Plan 365 Collaboration with Microsoft Project Files (MPP) Shared on Network Folders

Project Plan 365 Collaboration with Microsoft Project Files (MPP) Shared on Network Folders Project Plan 365 Collaboration with Microsoft Project Files (MPP) Shared on Network Folders White Paper Housatonic Software - Project Plan 365 App 2014 Contents 1. Introduction... 3 2. Prerequisites...

More information

Cloud Services MDM. Control Panel Provisioning Guide

Cloud Services MDM. Control Panel Provisioning Guide Cloud Services MDM Control Panel Provisioning Guide 10/24/2014 CONTENTS Overview... 2 Accessing MDM in the Control Panel... 3 Create the MDM Instance in the Control Panel... 3 Adding a New MDM User...

More information

How Do People Use Security in the Home

How Do People Use Security in the Home How Do People Use Security in the Home Kaarlo Lahtela Helsinki University of Technology Kaarlo.Lahtela@hut.fi Abstract This paper investigates home security. How much people know about security and how

More information

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15. NCS 330 Information Assurance Policies, Ethics and Disaster Recovery NYC University Polices and Standards 4/15/15 Jess Yanarella Table of Contents: Introduction: Part One: Risk Analysis Threats Vulnerabilities

More information

Common Core Network Readiness Guidelines Is your network ready? Detailed questions, processes, and actions to consider.

Common Core Network Readiness Guidelines Is your network ready? Detailed questions, processes, and actions to consider. Common Core Network Readiness Guidelines Is your network ready? Detailed questions, processes, and actions to consider. Is Your School Network Ready? Network readiness is an important factor in any new

More information

Welcome to Collage (Draft v0.1)

Welcome to Collage (Draft v0.1) Welcome to Collage (Draft v0.1) Table of Contents Welcome to Collage (Draft v0.1)... 1 Table of Contents... 1 Overview... 2 What is Collage?... 3 Getting started... 4 Searching for Images in Collage...

More information

WHITE PAPER. Understanding Transporter Concepts

WHITE PAPER. Understanding Transporter Concepts WHITE PAPER Understanding Transporter Concepts Contents Introduction... 3 Definition of Terms... 4 Organization... 4 Administrator... 4 Organization User... 4 Guest User... 4 Folder Hierarchies... 5 Traditional

More information

Dynamic Query Updation for User Authentication in cloud Environment

Dynamic Query Updation for User Authentication in cloud Environment Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,

More information

ZCorum s Ask a Broadband Expert Series:

ZCorum s Ask a Broadband Expert Series: s Ask a Broadband Expert Series: The Advantages of Network Virtualization An Interview with Peter Olivia, Director of Systems Engineering ZCorum 1.800.909.9441 4501 North Point Parkway, Suite 125 Alpharetta,

More information

A Scheme for Implementing Load Balancing of Web Server

A Scheme for Implementing Load Balancing of Web Server Journal of Information & Computational Science 7: 3 (2010) 759 765 Available at http://www.joics.com A Scheme for Implementing Load Balancing of Web Server Jianwu Wu School of Politics and Law and Public

More information

Development of a User Management Module for Internet TV Systems

Development of a User Management Module for Internet TV Systems , pp.43-56 http://dx.doi.org/10.14257/ijmue.2015.10.11.05 Development of a User Management Module for Internet TV Systems Kangjai Lee 1 and Jaegeol Yim 2* 1 Dept. of Computer Information, Suwon Science

More information

A New Approach For Estimating Software Effort Using RBFN Network

A New Approach For Estimating Software Effort Using RBFN Network IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.7, July 008 37 A New Approach For Estimating Software Using RBFN Network Ch. Satyananda Reddy, P. Sankara Rao, KVSVN Raju,

More information

Elastic Load Balancing in Cloud Storage

Elastic Load Balancing in Cloud Storage Elastic Load Balancing in Cloud Storage Surabhi Jain, Deepak Sharma (Lecturer, Department of Computer Science, Lovely Professional University, Phagwara-144402) (Assistant Professor, Department of Computer

More information

A Game Theoretic Approach for Cloud Computing Infrastructure to Improve the Performance

A Game Theoretic Approach for Cloud Computing Infrastructure to Improve the Performance P.Bhanuchand and N. Kesava Rao 1 A Game Theoretic Approach for Cloud Computing Infrastructure to Improve the Performance P.Bhanuchand, PG Student [M.Tech, CS], Dep. of CSE, Narayana Engineering College,

More information

Using PI to Exchange PGP Encrypted Files in a B2B Scenario

Using PI to Exchange PGP Encrypted Files in a B2B Scenario Using PI to Exchange PGP Encrypted Files in a B2B Scenario Applies to: SAP Net Weaver Process Integration 7.1 (SAP PI 7.1). For more information, visit the SOA Management homepage. Summary This document

More information

SCHEDULING IN CLOUD COMPUTING

SCHEDULING IN CLOUD COMPUTING SCHEDULING IN CLOUD COMPUTING Lipsa Tripathy, Rasmi Ranjan Patra CSA,CPGS,OUAT,Bhubaneswar,Odisha Abstract Cloud computing is an emerging technology. It process huge amount of data so scheduling mechanism

More information

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure) Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.

More information

Collaborative & Integrated Network & Systems Management: Management Using Grid Technologies

Collaborative & Integrated Network & Systems Management: Management Using Grid Technologies 2011 International Conference on Computer Communication and Management Proc.of CSIT vol.5 (2011) (2011) IACSIT Press, Singapore Collaborative & Integrated Network & Systems Management: Management Using

More information

Adaptive Load Balancing Method Enabling Auto-Specifying Threshold of Node Load Status for Apache Flume

Adaptive Load Balancing Method Enabling Auto-Specifying Threshold of Node Load Status for Apache Flume , pp. 201-210 http://dx.doi.org/10.14257/ijseia.2015.9.2.17 Adaptive Load Balancing Method Enabling Auto-Specifying Threshold of Node Load Status for Apache Flume UnGyu Han and Jinho Ahn Dept. of Comp.

More information

A Game Theory Modal Based On Cloud Computing For Public Cloud

A Game Theory Modal Based On Cloud Computing For Public Cloud IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. XII (Mar-Apr. 2014), PP 48-53 A Game Theory Modal Based On Cloud Computing For Public Cloud

More information

Design of 'Dr. on Click' Android Application

Design of 'Dr. on Click' Android Application Design of 'Dr. on Click' Android Application Thakor Swapnali S. 1, Patil Nayana Y. 2, Parikh Shubham A. 3, Thorat Pooja K. 4 B.E, Dept. of Computer, SRES COE, Kopargoan, India 1 B.E, Dept. of Computer,

More information

Efficient Cloud Management for Parallel Data Processing In Private Cloud

Efficient Cloud Management for Parallel Data Processing In Private Cloud 2012 International Conference on Information and Network Technology (ICINT 2012) IPCSIT vol. 37 (2012) (2012) IACSIT Press, Singapore Efficient Cloud Management for Parallel Data Processing In Private

More information

Load Balancing in cloud computing

Load Balancing in cloud computing Load Balancing in cloud computing 1 Foram F Kherani, 2 Prof.Jignesh Vania Department of computer engineering, Lok Jagruti Kendra Institute of Technology, India 1 kheraniforam@gmail.com, 2 jigumy@gmail.com

More information

Microsoft SQL Server for Oracle DBAs Course 40045; 4 Days, Instructor-led

Microsoft SQL Server for Oracle DBAs Course 40045; 4 Days, Instructor-led Microsoft SQL Server for Oracle DBAs Course 40045; 4 Days, Instructor-led Course Description This four-day instructor-led course provides students with the knowledge and skills to capitalize on their skills

More information

Computing Support Services at the Hawai`i Institute of Geophysics and Planetology

Computing Support Services at the Hawai`i Institute of Geophysics and Planetology Computing Support Services at the Hawai`i Institute of Geophysics and Planetology Introduction Three tiers of support are available from HIGP Computing Services. Described in detail below, they are summarized

More information

Reallocation and Allocation of Virtual Machines in Cloud Computing Manan D. Shah a, *, Harshad B. Prajapati b

Reallocation and Allocation of Virtual Machines in Cloud Computing Manan D. Shah a, *, Harshad B. Prajapati b Proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA-14) Reallocation and Allocation of Virtual Machines in Cloud Computing Manan

More information

Client Server Registration Protocol

Client Server Registration Protocol Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are

More information

Dynamic Thread Pool based Service Tracking Manager

Dynamic Thread Pool based Service Tracking Manager Dynamic Thread Pool based Service Tracking Manager D.V.Lavanya, V.K.Govindan Department of Computer Science & Engineering National Institute of Technology Calicut Calicut, India e-mail: lavanya.vijaysri@gmail.com,

More information

C-Meter: A Framework for Performance Analysis of Computing Clouds

C-Meter: A Framework for Performance Analysis of Computing Clouds 9th IEEE/ACM International Symposium on Cluster Computing and the Grid C-Meter: A Framework for Performance Analysis of Computing Clouds Nezih Yigitbasi, Alexandru Iosup, and Dick Epema Delft University

More information

DATA SECURITY MODEL FOR CLOUD COMPUTING

DATA SECURITY MODEL FOR CLOUD COMPUTING DATA SECURITY MODEL FOR CLOUD COMPUTING POOJA DHAWAN Assistant Professor, Deptt of Computer Application and Science Hindu Girls College, Jagadhri 135 001 poojadhawan786@gmail.com ABSTRACT Cloud Computing

More information

Designing a Data Solution with Microsoft SQL Server 2014

Designing a Data Solution with Microsoft SQL Server 2014 20465C - Version: 1 22 June 2016 Designing a Data Solution with Microsoft SQL Server 2014 Designing a Data Solution with Microsoft SQL Server 2014 20465C - Version: 1 5 days Course Description: The focus

More information

A Survey of Cloud Computing and Social Networks

A Survey of Cloud Computing and Social Networks Network and Communication Technologies; Vol. 2, No. 2; 2013 ISSN 1927-064X E-ISSN 1927-0658 Published by Canadian Center of Science and Education A Survey of Cloud Computing and Social Networks Sanjay

More information

Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays

Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays IOSR Journal of VLSI and Signal Processing (IOSR-JVSP) Volume 5, Issue, Ver. III (Jan - Feb. 205), PP 0- e-issn: 239 4200, p-issn No. : 239 497 www.iosrjournals.org Design and Analysis of Parallel AES

More information

The Recovery System for Hadoop Cluster

The Recovery System for Hadoop Cluster The Recovery System for Hadoop Cluster Prof. Priya Deshpande Dept. of Information Technology MIT College of engineering Pune, India priyardeshpande@gmail.com Darshan Bora Dept. of Information Technology

More information

What s the difference between my Home Banking password and my Enhanced Login Security?

What s the difference between my Home Banking password and my Enhanced Login Security? Common Questions about Enhanced Login Security 818-973-4900 or 800-973 - 4989 Mon. - Fri. 8:30 a.m. - 4:00 p.m. Enhanced Login Security is a new online security feature that will provide you additional

More information

Interaction Dialer 3.0. Best Practices

Interaction Dialer 3.0. Best Practices Interaction Dialer 3.0 Best Practices March 20, 2009 1 Table of Contents Overview... 3 Configuration... 3 Default Settings... 3 Copy & Paste... 3 Automation with Rules... 4 Change Auditing... 4 Pacing...

More information

USER GUIDE CLOUDME FOR WD SENTINEL

USER GUIDE CLOUDME FOR WD SENTINEL USER GUIDE CLOUDME FOR WD SENTINEL Document 2013-11-17 Page 2 of 13 TABLE OF CONTENTS INTRODUCTION 2 Safe European Storage 2 How does this really work? 2 GETTING STARTED 3 Setting up an account 3 Setting

More information

Cloud Web-Based Operating System (Cloud Web Os)

Cloud Web-Based Operating System (Cloud Web Os) Cloud Web-Based Operating System (Cloud Web Os) Hesham Abusaimeh Department of Computer Science, Faculty of Information Technology, Applied Science University, Amman, 11931 Jordan. ABSTRACT The cloud computing

More information

Phone Pal: Remote Mobile Access through Short Message Service Prof. Mitul K. Patel 1 Gadhiya Janki D. 2

Phone Pal: Remote Mobile Access through Short Message Service Prof. Mitul K. Patel 1 Gadhiya Janki D. 2 Phone Pal: Remote Mobile Access through Short Message Service Prof. Mitul K. Patel 1 Gadhiya Janki D. 2 Assistant Professor B.E. Student Computer Department Computer Department Shree Swami Atmanand Saraswati

More information

Survey on Models to Investigate Data Center Performance and QoS in Cloud Computing Infrastructure

Survey on Models to Investigate Data Center Performance and QoS in Cloud Computing Infrastructure Survey on Models to Investigate Data Center Performance and QoS in Cloud Computing Infrastructure Chandrakala Department of Computer Science and Engineering Srinivas School of Engineering, Mukka Mangalore,

More information

How To Compare Resource Allocation In Cloud Computing

How To Compare Resource Allocation In Cloud Computing An Efficient Resource Allocation Strategies in Cloud Computing B.Rajasekar 1,S.K.Manigandan 2 Final Year MCA Student, VelTech HighTech Engineering College, Chennai, India 1 Assistant Professor, VelTech

More information

Share and aggregate GPUs in your cluster. F. Silla Technical University of Valencia Spain

Share and aggregate GPUs in your cluster. F. Silla Technical University of Valencia Spain Share and aggregate s in your cluster F. Silla Technical University of Valencia Spain ... more technically... Remote virtualization F. Silla Technical University of Valencia Spain Accelerating applications

More information