ISSN: Journal of Chemical and Pharmaceutical Sciences Multiple-client data management using robust database pattern design S. A.
|
|
|
- Darlene Simon
- 10 years ago
- Views:
Transcription
1 ISSN: Multiple-client data management using robust database pattern design S. A. Ramesh Kumar 1, C.Ashwini 2, E. Rajeshwaran 3 1. Asst.Prof, Karpaga Vinayaga College of Engineering &Technology. 2. Asst.Prof, Karpaga Vinayaga College of Engineering &Technology 3. P.G. Student, Karpaga Vinayaga College of Engineering &Technology *Corresponding author: E.Mail: [email protected] ABSTRACT Major application of Software as a Service is a Multiple-Clients data management. Data management service is offered by a third party vendor to manage the outsourced data with the aid of Multiple-clients database system. The Multiple-clients database system needs a high quality database pattern to have high execution, low space requirements and excellent scalability. II approaches to design the pattern are Independent Tables Shared Instances (ITSI) and Shared Tables Shared Instances (STSI). ITSI has poor scalability; cost of implementation is high when the table size increases and bottleneck occurs. STSI provides good scalability, but poor performance and it calls for a great number of NULLS & wastes large number of places. An adaptive database pattern design method is suggested for Multipleclients applications to overcome the problems and limitations of ITSI & STSI. ITSI & STSI are used to find a balance to achieve good scalability and high performance with low space requirements. An appropriate number of base tables and supplemental tables are made by identifying the important attributes and remaining attributes. The turn of base tables is specified and constructed using Kernel matrix and Graph partitioning algorithms. A Page Rank algorithm is employed to measure the importance of attributes. The proposed method achieves high scalability, high performance and space demands. Index Terms: Multiple-Clients, STSI, ITSI 1. INTRODUCTION Cloud is something, which is present at the remote location. Cloud Computing refers to manipulating, configuring and accessing the applications online. It offers online data storage, infrastructure and application. Cloud computing in which large group of remote servers is networked to allow the centralized data storage, and online access to computer services or resources. Software as a Service (SaaS) represents a model that companies do not have to purchase and maintain their own infrastructure; instead they can acquire the services by software from a third party. Requests can be made by Service on Demand for Service Providers and require only Internet access to use the avails. The Service Provider must support Multiple-clients; it requires excellent public presentation, low space requirement and full scalability. In lodge to provide good performance the service provider must design a high-quality database pattern. 2. MULTIPLE-CLIENTS APPLICATIONS Multitenancy is a principle in software architecture where a single instance of the software functions on a server waiting on multiple customers. A client is a group of users sharing the same view of the software they use. With Multiple client architecture, a software application is designed to provide every client a dedicated part of the instance, including its data, configuration, user management and client s individual functionality. A Multiple-clients application allows customers or clients to share the same hardware resources, by providing them one shared application and database instance; clients can also configure the application based on their demands. 2.1 Characteristics of Multiple-Tenancy Hardware Resource Sharing High Degree of Configurability Hardware Resource Sharing: The traditional method similar to Application Service Provider (ASP), is the single-clients software development method in which clients have their own server, where server utilization is low. Through virtualization the server utilization can be amended by placing multiple clients on the same host. Virtualization enables higher utilization of the existing servers and scales down the hardware resources needed. Multiple clients have different shapes they are: I. Shared application, Independent database II. Shared application, Independent tables shared database instances April-June JCPS Volume 8 Issue 2
2 III. Shared application, Shared tables shared database instances ISSN: High Degree of Configurability: Customers or clients receive their own customized applications in a single client s environment so they can configure their applications based on their demands. When comes to Multiple-clients environment, Multiple customers or clients share the single application, then it is impossible to configure the application based on user demands. It is necessary to run Multiple versions of the same application next to each other for high degree of configurability. 2.2 Problem Formulation: Service Provider maintains Multiple-clients databases to store and handle the outsourced Multiple-clients data. Renters can apply SQL queries to view their information. Every client outsources a database with the number of tables (T1, T2, T3 Tn) they are called as source tables. It s the obligation of service provider to serve the clients with quick response. To offer such a service to large number of renters service provider requires a Multiple-clients database with good scalability and high performance with low space requirements. To reach this challenge the service provider needs to redesign the database pattern to manage the information efficiently. Redesigned tables are called physical tables. Source Tables a. Customer Table for Clients 3 Customer key Name Address Salary Nation 0005 Raju UK 9000 London 0046 Sakthi Goa India 0012 Gopi New York US 0009 Arun Japan France a. Customer table for Clients 6 b. Customer table for Clients 10 Customer Name Address Salary Customer Name Address Age key key 1111 Ram Chennai Sri Coimbatore Shoba Africa Srini Kumbakonam Jeni Mumbai Sathish Chennai 25 3 ARCHITECTURE OF ADAPTIVE DATABASE PATTERN DESIGN Client outsources their tables to service provider in their own name. The service provider reconstructs the physical tables from attribute level. Several base tables are constructed using the highly important attributes and by using the remaining unimportant attributes supplementary tables are generated. Figure.1. April-June JCPS Volume 8 Issue 2
3 Common Attribute: An attribute from source table that is highly shared is known as a common attribute. When the usual properties are highly shared by a number of clients then they are called as important attributes. Star Attribute: An attribute from source tables that is primary key and also referenced by some other source tables is called star attribute. Uncommon Attribute: An attribute is called an uncommon attribute if it is neither a common attribute nor a star attribute. In the above case of the Customer table in STSI, the data of several clients are stored below the single board using the properties. As we discussed earlier STSI method occupies number of NULL values in empty attribute places. In the above example Nation & Age attribute occupies several NULL values that waste a large sum of quads. Adaptive Database Pattern design method is presented to overcome the problems of ITSI & STSI. In this method Customer table is separated into a Base Table and Supplementary Table based on the important attributes and insignificant attributes. 3.1 Experimental Work Data Upload to Service Provider: Many companies outsource their data to a third party service supplier that supplies information management service which hosts a Multiple-clients database. Each society is called clients. Clients manage and query their information by posing SQL queries to the database scheme. Renters must register their information to a service provider for a service request. Once the service is granted the clients companies can log on to their profile and can upload their data to the avail provider. Service Provider authenticates the data for cloud storage. Renters can view their data from cloud storage once the files have been uploaded. Company login details can be viewed from the Company Register table. Status table can be utilized to consider the status of data that has been uploaded. Service Provider details can be viewed from the Service Provider Login table ITSI & STSI: The traditional method developed to design a Multiple-clients database is Independent Databases and Independent Instances (IDII). In this method the service provider will build an independent and separate database to store the client files, but the single hardware is shared by multiple clients. Deployment of IDII is easy and it has good data isolation and security. Maintenance cost of IDII is very expensive; the service provider has to do so many constellations in order to manage different database instances. As advancement to IDII, Independent Tables Shared Database Instances (ITSI) has been introduced, by this method clients can share both hardware and database instance. The service provider utilizes the same database instance to store all the source tables that are uploaded by multiple clients in this method maintains private tables for each renter. A TENANT ID is applied to separate the tables from different clients with similar names. Queries from clients are translated using clients ID to return correct answers to the corresponding clients. Maintenance cost of ITSI is low when compared to IDII and also offers better scalability because of its single database instances. The scalability is limited when the number of private tables in the shared database grows in proportion to the number of clients. When the number of tables is large the memory cost will increase. Shared Tables and Shared Database Instances (STSI) was introduced to overcome the limitations of IDII &ITSI. STSI shares both the database instances and the control panels. The service provider employs a great table to stash away the Multiple-clients data these tables contain all the tuples of clients. A column client ID is used for the purpose of dividing the tuples of each client. NULL is filled for clients with no attributes. STSI has reduced maintenance cost and provides better scalability as the size of the big table varies based on the number of source tables uploaded by clients. Of course STSI also have more or less of the limitations, large quantities of space are wasted with NULLS by a low number of clients with less attributes. The performance of STSI is obviously degraded when database tables become too sparse Multiple-Clients DB Design: Multiple clients outsource their data to the service provider; the service provider evaluates the tables and extracts the common, uncommon, star, important and unimportant attributes. Kernel matrix is used to determine the number of base tables and adopt graph partitioning algorithm to construct the base tables. Page Rank algorithm is used to analyze the importance of attributes. A cost based model is used to automatically generate high-quality database pattern. 4. GRAPH PARTITIONING ALGORITHMS The graph partition problem is defined on data presented in the shape of a graph G = (V, E) with V vertices and E edges, such that it is possible to partition G into smaller components with specific attributes. For illustration, a April-June JCPS Volume 8 Issue 2
4 k-way partition divides the vertex set into k smaller components. A good segmentation is defined as one in which the number of edges running between separated components is small. Uniform graph partition is a type of graph partitioning problem that consists of splitting up a graph into components, such that the components are of roughly the same size and there are few connections between the parts. Significant applications of graph partitioning include scientific computing, partitioning various stages of a VLSI design circuit and task scheduling. Customer Table Layout in STSI TID Customer key Name Address Salary Nation Age Raju UK 9000 London NULL Suri Goa India NULL Gopi New York US NULL Arun Japan France NULL Ram Chennai NULL NULL Shoba Africa NULL NULL Jeni Mumbai NULL NULL Sri Chennai NULL NULL Srini Andhra NULL NULL Sai Chennai NULL NULL 25 Expensive Attribute List ATTR_NAME BTable_NO OCC_TIME NULL_NUM C_SALARY C_AGE C_NATION TID Customer key Age PAGE RANK ALGORITHM Customer Table Layout in ADAPT a. Base Table TID Customer key Name Address Salary Raju UK Suri Goa Gopi New York Arun Japan Ram Chennai Shoba Africa Jeni Mumbai Sri Chennai NULL Srini Andhra NULL Sai Chennai NULL b. Supplementary Tables TID Customer key Nation London India US France Page Rank is a link analysis and it specifies a numerical weighting to each component of a hyperlinked set of text files, such as the World Wide Web, with the design of assessing its relative importance within the circle. The algorithm may be applied to any collection of entities with reciprocal quotations and citations. The numerical weight that it ascribes to any given element E is referred to as the Page Rank of E denoted by PR (E). 6 ADVANTAGES OF ADAPTIVE DATABASE PATTERN 6.1 High Scalability: Scalability is the ability of a system, network, or process to handle a growing amount of work in a capable manner or its ability to be enlarged to accommodate that growth. Our proposed system the number of tables does not grow linearly and the scalability is limited. April-June JCPS Volume 8 Issue 2
5 6.2 High Performance: In Adaptive database pattern method the index method is very effective and it delivers high performance with reduced NULLs but STSI degrades the performance with a number of NULLS in the board. 6.3 Low Space Requirements: The attributes from all the clients are put into a single large table without any importance in STSI and it lets in a great amount of Nulls. In proposing method the attributes are divided into important and unimportant attributes and stored in the base table and auxiliary tables 7. CONCLUSION In this report, we propose an Adaptive database pattern design by placing the important attributes such as common properties, star attributes and dependent attributes to get the base tables using the important properties. Supplementary tables are built utilizing the other properties. In this method base table is set and built using Kernel matrix and Graph partitioning algorithms. A Page Rank algorithm is used to evaluate the importance of attributes. The proposed method achieves high scalability, high performance and space requirements. REFERENCES B C Ooi, B Yu and G Li. One table stores all: Enabling painless free-and-easy data publishing and sharing, In CIDR, 2007, C P Bezemer and A Zaidman, Multiple-clients saas applications: maintenance dream or nightmare? In EVOL/IWPSE, 2010, H Cai, B Reinwald, N Wang and C Guo, Saas Multi-tenancy: Framework, technology and case study. IJCAC, 1(1), 2011, K Haller, Web services from service provider prespective: Client s management services for Multitenant information systems. ACM SIGSOFT Software Engineering Notes, 36(1), 2011, 1-4. M Hui, D Jiang, G Li and Y Zhou. Supporting database applications as a service, In ICDE, 2009, W Lang, S Shankar, J M Patel and A Kalhan, Towards Multitenants performance slos, In ICDE, 2012, W Lee and M Choi. A Multiple-clients web application framework for saas. In IEEE CLOUD, 2012, April-June JCPS Volume 8 Issue 2
Multiple-Client Information Administration via Forceful Database Prototype Design (FDPD)
Multiple-Client Information Administration via Forceful Database Prototype Design (FDPD) M.Rajesh, Research Scholar, Department of Computer Science & Engg., St.Peter's University Chennai, [email protected]
Cryptographic Data Security over Cloud
Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.
KEYWORD SEARCH IN RELATIONAL DATABASES
KEYWORD SEARCH IN RELATIONAL DATABASES N.Divya Bharathi 1 1 PG Scholar, Department of Computer Science and Engineering, ABSTRACT Adhiyamaan College of Engineering, Hosur, (India). Data mining refers to
IDENTIFYING AND OPTIMIZING DATA DUPLICATION BY EFFICIENT MEMORY ALLOCATION IN REPOSITORY BY SINGLE INSTANCE STORAGE
IDENTIFYING AND OPTIMIZING DATA DUPLICATION BY EFFICIENT MEMORY ALLOCATION IN REPOSITORY BY SINGLE INSTANCE STORAGE 1 M.PRADEEP RAJA, 2 R.C SANTHOSH KUMAR, 3 P.KIRUTHIGA, 4 V. LOGESHWARI 1,2,3 Student,
PartJoin: An Efficient Storage and Query Execution for Data Warehouses
PartJoin: An Efficient Storage and Query Execution for Data Warehouses Ladjel Bellatreche 1, Michel Schneider 2, Mukesh Mohania 3, and Bharat Bhargava 4 1 IMERIR, Perpignan, FRANCE [email protected] 2
Building Multi-tenant Applications with Actian PSQL
Building Multi-tenant Applications with Actian PSQL Actian PSQL White Paper May 2013 This white paper is the first in a series of papers designed to show how easily Actian PSQL can provide all the requirements
The deployment of OHMS TM. in private cloud
Healthcare activities from anywhere anytime The deployment of OHMS TM in private cloud 1.0 Overview:.OHMS TM is software as a service (SaaS) platform that enables the multiple users to login from anywhere
Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou
3rd International Conference on Science and Social Research (ICSSR 2014) Exploration on Security System Structure of Smart Campus Based on Cloud Computing Wei Zhou Information Center, Shanghai University
SAAS. Best practices for SAAS implementation using an Open Source Portal (JBoss)
SAAS Best practices for SAAS implementation using an Open Source Portal (JBoss) Introduction JBoss Portal is a very popular open source portal offering from Red Hat. It is JSR-168 compliant and provides
User Authentication Platform using Provisioning in Cloud Computing Environment
User Authentication Platform using Provisioning in Cloud Computing Environment Hyosik Ahn, Hyokyung Chang, Changbok Jang, Euiin Choi Dept. Of Computer Engineering, Hannam University, Daejeon, Korea {hsahn,
MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT
MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT 1 SARIKA K B, 2 S SUBASREE 1 Department of Computer Science, Nehru College of Engineering and Research Centre, Thrissur, Kerala 2 Professor and Head,
A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes
CLOUD BASED PEER TO PEER NETWORK FOR ENTERPRISE DATAWAREHOUSE SHARING
CLOUD BASED PEER TO PEER NETWORK FOR ENTERPRISE DATAWAREHOUSE SHARING Basangouda V.K 1,Aruna M.G 2 1 PG Student, Dept of CSE, M.S Engineering College, Bangalore,[email protected] 2 Associate Professor.,
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph
MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph Janani K 1, Narmatha S 2 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of
InfiniteGraph: The Distributed Graph Database
A Performance and Distributed Performance Benchmark of InfiniteGraph and a Leading Open Source Graph Database Using Synthetic Data Objectivity, Inc. 640 West California Ave. Suite 240 Sunnyvale, CA 94086
ABSTRACT: [Type text] Page 2109
International Journal Of Scientific Research And Education Volume 2 Issue 10 Pages-2109-2115 October-2014 ISSN (e): 2321-7545 Website: http://ijsae.in ABSTRACT: Database Management System as a Cloud Computing
Dependency Free Distributed Database Caching for Web Applications and Web Services
Dependency Free Distributed Database Caching for Web Applications and Web Services Hemant Kumar Mehta School of Computer Science and IT, Devi Ahilya University Indore, India Priyesh Kanungo Patel College
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 Network Virtualization Overview... 1 Network Virtualization Key Requirements to be validated...
CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES
CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES 1 MYOUNGJIN KIM, 2 CUI YUN, 3 SEUNGHO HAN, 4 HANKU LEE 1,2,3,4 Department of Internet & Multimedia Engineering,
Security Analysis of Cloud Computing: A Survey
Security Analysis of Cloud Computing: A Survey Kamaljeet Pakhre 1, Navdeep Singh 2, Sanket Mani Tiwari 3 1,2,3 Research Scholar, M. Tech. (CSE), Galgotias University, Greater Noida, India. Abstract Now
Multi Tenancy and Customizations Issues in e-health SaaS Applications
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 10, October 2015,
Iaas for Private and Public Cloud using Openstack
Iaas for Private and Public Cloud using Openstack J. Beschi Raja, Assistant Professor, Department of CSE, Kalasalingam Institute of Technology, TamilNadu, India, K.Vivek Rabinson, PG Student, Department
An Approach Towards Customized Multi- Tenancy
I.J.Modern Education and Computer Science, 2012, 9, 39-44 Published Online September 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2012.09.05 An Approach Towards Customized Multi- Tenancy
Liferay Portal Performance. Benchmark Study of Liferay Portal Enterprise Edition
Liferay Portal Performance Benchmark Study of Liferay Portal Enterprise Edition Table of Contents Executive Summary... 3 Test Scenarios... 4 Benchmark Configuration and Methodology... 5 Environment Configuration...
EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM Macha Arun 1, B.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Holy Mary
Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds
Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds ABSTRACT: Software-as-a-service (SaaS) cloud systems enable application service providers to deliver their applications
An Overview of Distributed Databases
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 207-214 International Research Publications House http://www. irphouse.com /ijict.htm An Overview
Multi-Tenant Engineering Architecture in SaaS
Multi-Tenant Engineering Architecture in SaaS Sunil Kumar Khatri Himanshu Singhal Khushboo Bahri ABSTRACT Multi-Tenancy in SaaS (Software as a Service) architecture is the concept leveraging cloud computing
Dynamic resource management for energy saving in the cloud computing environment
Dynamic resource management for energy saving in the cloud computing environment Liang-Teh Lee, Kang-Yuan Liu, and Hui-Yang Huang Department of Computer Science and Engineering, Tatung University, Taiwan
Method of Fault Detection in Cloud Computing Systems
, pp.205-212 http://dx.doi.org/10.14257/ijgdc.2014.7.3.21 Method of Fault Detection in Cloud Computing Systems Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu Yunnan Key Lab of Computer Technology Application,
Ensuring security the last barrier to Cloud adoption
Ensuring security the last barrier to Cloud adoption Publication date: March 2011 Ensuring security the last barrier to Cloud adoption Cloud computing has powerful attractions for the organisation. It
Convert your web application to a Multi tenant SaaS solution using "SaaS-Tenant " Framework
P a g e 2 Convert your web application to a Multi tenant SaaS solution using "SaaS-Tenant " Framework An account of directions and steps to speedily convert your web application into a cloud application
Cloud Based E-Learning Platform Using Dynamic Chunk Size
Cloud Based E-Learning Platform Using Dynamic Chunk Size Dinoop M.S #1, Durga.S*2 PG Scholar, Karunya University Assistant Professor, Karunya University Abstract: E-learning is a tool which has the potential
Case Study. Migration to Cloud and SaaS. InVision Software AG, Germany. Enterprise-wide Workforce Management Solution
Case Study Migration to Cloud and SaaS Enterprise-wide Workforce Management Solution InVision Software AG, Germany The Customer InVision Software is a world-leading supplier of enterprise-wide workforce
How To Ensure Correctness Of Data In The Cloud
A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, [email protected] 2 M. Tech.
5-Layered Architecture of Cloud Database Management System
Available online at www.sciencedirect.com ScienceDirect AASRI Procedia 5 (2013 ) 194 199 2013 AASRI Conference on Parallel and Distributed Computing and Systems 5-Layered Architecture of Cloud Database
SQL Server Administrator Introduction - 3 Days Objectives
SQL Server Administrator Introduction - 3 Days INTRODUCTION TO MICROSOFT SQL SERVER Exploring the components of SQL Server Identifying SQL Server administration tasks INSTALLING SQL SERVER Identifying
Cloud Data Protection for the Masses
Cloud Data Protection for the Masses N.Janardhan 1, Y.Raja Sree 2, R.Himaja 3, 1,2,3 {Department of Computer Science and Engineering, K L University, Guntur, Andhra Pradesh, India} Abstract Cloud computing
Resource Allocation Avoiding SLA Violations in Cloud Framework for SaaS
Resource Allocation Avoiding SLA Violations in Cloud Framework for SaaS Shantanu Sasane Abhilash Bari Kaustubh Memane Aniket Pathak Prof. A. A.Deshmukh University of Pune University of Pune University
Parallels Virtuozzo Containers
Parallels Virtuozzo Containers White Paper Virtual Desktop Infrastructure www.parallels.com Version 1.0 Table of Contents Table of Contents... 2 Enterprise Desktop Computing Challenges... 3 What is Virtual
TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence Support
Vol. 3 Issue 1, January-2014, pp: (32-36), Impact Factor: 1.252, Available online at: www.erpublications.com TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence
SURVEY ON VIRTUALIZATION VULNERABILITIES
SURVEY ON VIRTUALIZATION VULNERABILITIES Indumathy M Department of MCA, Acharya Institute of Technology, Bangalore, (India) ABSTRACT Virtualization plays a major role in serving the organizations to reduce
Elasticity in Multitenant Databases Through Virtual Tenants
Elasticity in Multitenant Databases Through Virtual Tenants 1 Monika Jain, 2 Iti Sharma Career Point University, Kota, Rajasthan, India 1 [email protected], 2 [email protected] Abstract -
Email: [email protected]. 2 Prof, Dept of CSE, Institute of Aeronautical Engineering, Hyderabad, Andhrapradesh, India,
www.semargroup.org, www.ijsetr.com ISSN 2319-8885 Vol.03,Issue.06, May-2014, Pages:0963-0968 Improving Efficiency of Public Cloud Using Load Balancing Model SHRAVAN KUMAR 1, DR. N. CHANDRA SEKHAR REDDY
Software as a Service (SaaS) for Management information system using multiple tenants
Software as a Service (SaaS) for Management information system using multiple tenants Rachana Desale, Purva Kolhatkar, Anju More, Piyush Katira, Vishal Kokane Prof.S.M.Jaybhaye (Department of Information
Natural Language to Relational Query by Using Parsing Compiler
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,
ISI INTERNATIONAL STRATEGY & INVESTMENT
ISI INTERNATIONAL STRATEGY & INVESTMENT Cloud Computing Information Security and Privacy Advisory Board Bill Whyman December 5, 2008 [email protected] Cloud Computing Is the BIG Change In I.T. Cloud applications
How To Make A Secure Storage On A Mobile Device Secure
Outsourcing with secure accessibility in mobile cloud computing Monika Waghmare 1, Prof T.A.Chavan 2 Department of Information technology, Smt.Kashibai Navale College of Engineering, Pune, India. Abstract
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
KEYWORD SEARCH OVER PROBABILISTIC RDF GRAPHS
ABSTRACT KEYWORD SEARCH OVER PROBABILISTIC RDF GRAPHS In many real applications, RDF (Resource Description Framework) has been widely used as a W3C standard to describe data in the Semantic Web. In practice,
ABSTRACT. KEYWORDS: Cloud Computing, Load Balancing, Scheduling Algorithms, FCFS, Group-Based Scheduling Algorithm
A REVIEW OF THE LOAD BALANCING TECHNIQUES AT CLOUD SERVER Kiran Bala, Sahil Vashist, Rajwinder Singh, Gagandeep Singh Department of Computer Science & Engineering, Chandigarh Engineering College, Landran(Pb),
Migration of Virtual Machines for Better Performance in Cloud Computing Environment
Migration of Virtual Machines for Better Performance in Cloud Computing Environment J.Sreekanth 1, B.Santhosh Kumar 2 PG Scholar, Dept. of CSE, G Pulla Reddy Engineering College, Kurnool, Andhra Pradesh,
Commercial Software Licensing
Commercial Software Licensing CHAPTER 12: Prepared by DoD ESI January 2013 Chapter Overview Most software licenses today are either perpetual or subscription. Perpetual licenses involve software possession
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
A Study on Workload Imbalance Issues in Data Intensive Distributed Computing
A Study on Workload Imbalance Issues in Data Intensive Distributed Computing Sven Groot 1, Kazuo Goda 1, and Masaru Kitsuregawa 1 University of Tokyo, 4-6-1 Komaba, Meguro-ku, Tokyo 153-8505, Japan Abstract.
ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability
Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India
Operating Stoop for Efficient Parallel Data Processing In Cloud
RESEARCH INVENTY: International Journal of Engineering and Science ISBN: 2319-6483, ISSN: 2278-4721, Vol. 1, Issue 10 (December 2012), PP 11-15 www.researchinventy.com Operating Stoop for Efficient Parallel
Optimal Service Pricing for a Cloud Cache
Optimal Service Pricing for a Cloud Cache K.SRAVANTHI Department of Computer Science & Engineering (M.Tech.) Sindura College of Engineering and Technology Ramagundam,Telangana G.LAKSHMI Asst. Professor,
Bitmap Index an Efficient Approach to Improve Performance of Data Warehouse Queries
Bitmap Index an Efficient Approach to Improve Performance of Data Warehouse Queries Kale Sarika Prakash 1, P. M. Joe Prathap 2 1 Research Scholar, Department of Computer Science and Engineering, St. Peters
Homomorphic Encryption Schema for Privacy Preserving Mining of Association Rules
Homomorphic Encryption Schema for Privacy Preserving Mining of Association Rules M.Sangeetha 1, P. Anishprabu 2, S. Shanmathi 3 Department of Computer Science and Engineering SriGuru Institute of Technology
An efficient Join-Engine to the SQL query based on Hive with Hbase Zhao zhi-cheng & Jiang Yi
International Conference on Applied Science and Engineering Innovation (ASEI 2015) An efficient Join-Engine to the SQL query based on Hive with Hbase Zhao zhi-cheng & Jiang Yi Institute of Computer Forensics,
Implementing a Data Warehouse with Microsoft SQL Server 2012
Implementing a Data Warehouse with Microsoft SQL Server 2012 Module 1: Introduction to Data Warehousing Describe data warehouse concepts and architecture considerations Considerations for a Data Warehouse
College of Engineering, Technology, and Computer Science
College of Engineering, Technology, and Computer Science Design and Implementation of Cloud-based Data Warehousing In partial fulfillment of the requirements for the Degree of Master of Science in Technology
A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing
A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing Liang-Teh Lee, Kang-Yuan Liu, Hui-Yang Huang and Chia-Ying Tseng Department of Computer Science and Engineering,
Task Placement in a Cloud with Case-based Reasoning
Task Placement in a Cloud with Case-based Reasoning Eric Schulte-Zurhausen and Mirjam Minor Institute of Informatik, Goethe University, Robert-Mayer-Str.10, Frankfurt am Main, Germany {eschulte, minor}@informatik.uni-frankfurt.de
Contents. 1. Introduction
Summary Cloud computing has become one of the key words in the IT industry. The cloud represents the internet or an infrastructure for the communication between all components, providing and receiving
Query Optimization Approach in SQL to prepare Data Sets for Data Mining Analysis
Query Optimization Approach in SQL to prepare Data Sets for Data Mining Analysis Rajesh Reddy Muley 1, Sravani Achanta 2, Prof.S.V.Achutha Rao 3 1 pursuing M.Tech(CSE), Vikas College of Engineering and
[Sudhagar*, 5(5): May, 2016] ISSN: 2277-9655 Impact Factor: 3.785
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY AVOID DATA MINING BASED ATTACKS IN RAIN-CLOUD D.Sudhagar * * Assistant Professor, Department of Information Technology, Jerusalem
Load Testing and Monitoring Web Applications in a Windows Environment
OpenDemand Systems, Inc. Load Testing and Monitoring Web Applications in a Windows Environment Introduction An often overlooked step in the development and deployment of Web applications on the Windows
A Survey on Load Balancing and Scheduling in Cloud Computing
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 7 December 2014 ISSN (online): 2349-6010 A Survey on Load Balancing and Scheduling in Cloud Computing Niraj Patel
EXIN Cloud Computing Foundation
Sample Questions EXIN Cloud Computing Foundation Edition April 2013 Copyright 2013 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing
Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications
Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications Rouven Kreb 1 and Manuel Loesch 2 1 SAP AG, Walldorf, Germany 2 FZI Research Center for Information
Virtual Machine in Data Center Switches Huawei Virtual System
Virtual Machine in Data Center Switches Huawei Virtual System Contents 1 Introduction... 3 2 VS: From the Aspect of Virtualization Technology... 3 3 VS: From the Aspect of Market Driving... 4 4 VS: From
Aras Innovator 10 Scalability Benchmark Methodology and Performance Results
Aras Innovator 10 Scalability Benchmark Methodology and Performance Results Aras Innovator 10 Running on SQL Server 2012 Enterprise Edition Contents Executive Summary... 1 Introduction... 2 About Aras...
Microsoft HPC. V 1.0 José M. Cámara ([email protected])
Microsoft HPC V 1.0 José M. Cámara ([email protected]) Introduction Microsoft High Performance Computing Package addresses computing power from a rather different approach. It is mainly focused on commodity
Amazon EC2 XenApp Scalability Analysis
WHITE PAPER Citrix XenApp Amazon EC2 XenApp Scalability Analysis www.citrix.com Table of Contents Introduction...3 Results Summary...3 Detailed Results...4 Methods of Determining Results...4 Amazon EC2
A Platform for Changing Legacy Application to Multi-tenant Model
, pp.407-418 http://dx.doi.org/10.14257/ijmue.2014.9.8.38 A Platform for Changing Legacy Application to Multi-tenant Model Yangpeng Zhu School of Economic and Management, Xi an Shiyou University, Xi an
SaaS & Cloud Application Development & Delivery
SaaS & Cloud Application Development & Delivery A Whitepaper by Ekartha, Inc. by Gurpreet Singh, Ekartha Inc. Raj Sethi, Ekartha Inc. Ekartha, Inc. 63 Cutter Mill Road Great Neck, N.Y. 11021 Tel.: (516)
Cloud application services (SaaS) Multi-Tenant Data Architecture Shailesh Paliwal Infosys Technologies Limited
Cloud application services (SaaS) Multi-Tenant Data Architecture Shailesh Paliwal Infosys Technologies Limited The paper starts with a generic discussion on the cloud application services and security
