Hierarchical Trust Model to Rate Cloud Service Providers based on Infrastructure as a Service

Size: px
Start display at page:

Download "Hierarchical Trust Model to Rate Cloud Service Providers based on Infrastructure as a Service"

Transcription

1 Hierarchical Model to Rate Cloud Service Providers based on Infrastructure as a Service Supriya M 1, Sangeeta K 1, G K Patra 2 1 Department of CSE, Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Bengaluru, India. 2 CSIR Fourth Paradigm Institute (Formerly CSIR C-MMACS), Bengaluru, India {m_supriya,k_sangeeta}@blr.amrita.edu, gkpatra@csir4pi.in Abstract In large scale distributed systems like cloud computing, customers need to interact with unknown service providers to carry out tasks or transactions. The ability to reason about and assess the possible risks in carrying out such transactions is necessary for providing a safe and trustworthy environment. Cooperative characteristics of distributed computing systems enforce a proper and secure trust management to be in place to minimize the risks posed by different malicious agents. is the estimation of competency of a resource provider in completing a task based on dependability, security, ability and availability in the context of distributed environment. It enables users to select the best resources in the heterogeneous cloud infrastructure. In this paper, a hierarchical trust model has been proposed to manage the trust and to rate the service providers and their various plans based on IaaS in cloud computing environment. 1. Introduction Cloud model is the latest advancement in the large distributed system category. Cloud computing is a pervasive paradigm, where large pools of systems are connected in private or public networks, to provide dynamically scalable infrastructure for application, data and file storage [1]. It refers to the underlying infrastructure that provides services to customers via defined interfaces. Services are provided on demand basis to cloud users over high-speed internet within the X as a service (XaaS) computing framework where X represents Infrastructure, Platform, Software, Database etc. Among the various service models available in cloud, Infrastructure as a Service (IaaS) plays a vital role. IaaS is the delivery of computing resources as a service through APIs, which includes virtual machines, operating systems and other abstracted hardware [2]. The customer rents these resources which are dynamically scalable as per usage, rather than buying and installing them. Examples for IaaS include Amazon EC2 and S3 service providers. Due to the large scale and openness of these systems, a customer is often required to interact with service providers with whom he has few or no shared past interactions. To assess the risk of such interactions and to determine whether an unknown service provider is trustworthy, an efficient trust mechanism is necessary. is an important ingredient facilitating reliable interactions among autonomous participants in diverse large-scale systems including e-commerce, distributed and peer-to-peer systems, multi-agent systems and dynamic collaborative systems [3]. Firdhous et. al. [4] have provided a comprehensive survey on the trust management systems implemented on distributed systems with a special emphasis on cloud computing. The critical security challenges like data service outsourcing security and computation outsourcing security are outlined in [5], with emphasis on the need to address access control and multitenancy issues for a trustworthy public cloud environment. A formal trust management model for Software as a Service (SaaS) based on the basics of the trust characteristics is presented in [6]. This model is capable to handle various cloud services access scenarios where an entity may or may not have a past experience with the service. Xin [7] proposes the use of stereotypes to assess trustworthiness of the target agent whose past behaviour information is not locally available to a trustor, which is very common in large scale, open distributed systems. The problem of trust evaluation has not been done practically. In recent years, fuzzy logic has been used in several decision support systems, to represent uncertainties, especially when they need to be handled quantitatively. It offers the ability to handle uncertainty and imprecision effectively, and is therefore ideally suited to reasoning about trust. The fuzzy operations and rules can be used in the formal decision-making process to handle uncertainty in trust management. 1102

2 A model to estimate the trust value of the cloud service providers using fuzzy logic is described in [8]. This model is used in [9] to compare the cloud service providers and their various plans based on the direct and recommended trust considering, Finance and as parameters. In this model, was not considered as a parameter which is an important requirement for the users of the cloud since when a company outsources its confidential data to another company or a cloud; it needs assurance that the service provider has used reasonable security to protect those data. In this paper, we propose a hierarchical model which extends the model described in [9] and rates the cloud service providers and their plans based on 5 parameters:, Finance,, and. In this model the user has the option to give priority to /Finance as compared to other parameters and rate the service providers based on their level of security and cost. The rest of the paper is organized as follows: Section 2 describes the SMI Framework and the proposed hierarchical model is described in Section 3. Cloud Service Providers (CSPs), their plans and infrastructure details are described in Section 4. Section 5 explains the simulation and results of Cloud Analyst. The rating of the service providers using the hierarchical model is arrived at in Section 6. The paper is concluded in Section SMI Framework The Service Measurement Index (SMI) is a set of business-relevant Key Indicators (KPI's) that provide a standardized method for measuring and comparing a business service [10]. This method is used by the organizations to measure cloud-based business services based on their specific business and technology requirements. The Service Measurement Index is currently being developed by the Cloud Services Measurement Initiative Consortium (CSMIC). The SMI framework describes Accountability,, Assurance,, /Privacy, and as the seven KPI s. These KPI s have various attributes that help to measure and compare the business services. 3. Hierarchical Model Description The trust evaluation model described in [8] uses, and KPIs described by CSMIC and rates the CSPs using fuzzy logic toolbox of Matlab [11]. This model implementation comprises of 2 stages. The first stage is the implementation with the help of Mamdani which evaluates, and parameters. The parameter is evaluated by considering the number of processors and the RAM capacity available with the CSP. parameter is evaluated using Virtual Machine (V.M) Cost, Storage Cost, and Data Transfer Cost. parameter takes number of Data Centers (DCs), Storage space and number of V.Ms as its inputs. The second stage implementation takes the output of the first stage FIS and helps to obtain the trust rating for each plan of the CSP. The trust values obtained from the above is considered as the Direct (i.e) only by the observation of the infrastructure facilities available with the CSP. These infrastructure facilities are simulated using Cloud Analyst [12] which provides the DC processing time and Total cost as the output. These outputs are fed to the parameter and Finance parameter respectively (in addition to the above mentioned inputs) and the FIS is re-run to get the Recommended value between 0 and 1. The model block diagram (Direct ) is shown in Figure 1. No. of Processors Processor Speed (RAM) V.M Cost Storage Cost Data Transfer Cost Degree of No. of DCs Storage Space No. of V.Ms Figure 1 Model Block Diagram 1103

3 The model discussed above rates the CSPs and their plans with no emphasis given to security. But the data security raises a number of concerns, including the risk of loss, unauthorized collection and usage, if the CSP does not provide adequate data protection [2]. In other words, security is a major concern for all consumers. So the model of Figure 1 has now been extended to include two more parameters - and. The parameter is described in terms of the Physical, Internal and Network levels available with the cloud provider, while the parameter of the model is calculated based on the contributions from the Understandability, Easability and Flexibility attributes. Contribution of various attributes towards the model parameters is listed Table 1. Once again a two stage (FIS) is used for estimation of trust value corresponding to different plans of the CSP for the model shown in Figure 2. But in this model, the second stage of the FIS alone takes 5 5 = 3125 rules, i.e the number of inputs to the FIS to the power number of membership values (very low, low, medium, high and very high). If we desire to extend this model further with one additional parameter it would take 5 6 = rules. Hence the complexity of the system increases exponentially, if we desire to compute the trust values based on all parameters of the SMI as mentioned in section 2. This necessitates the development of hierarchical model where the input parameters can be chosen by the consumer as per his requirements and priority to bring down the number of rules for rating the service providers. TABLE 1 Model Parameters KPI Parameter Contributing Attributes No. of Physical Units (DCs), No. of V.Ms, Memory Size Finance V.M Cost, Storage Cost, Data Transfer Cost No. of Processors, Processor Speed (RAM) Physical, Internal, Network Understandability, Easability, Flexibility No. of Processors Processor Speed (RAM) V.M Cost Storage Cost Data Transfer Cost No. of DCs Storage Space No. of V.Ms Degree of Physical Internal Network Understandability Easability Flexibility In this work a hierarchical model to rate the CSPs has been designed giving priority to Finance/ as input parameters to the trust model as shown in Figures 3 and 4 respectively. These models provide the trust value for the CSP based on Direct rating. The DC Processing time and Total cost obtained from the Cloud Analyst simulation are then added to the and FIS respectively to obtain the Recommended rating. Figure 2 Proposed Model Block Diagram The user or customer of the cloud may need to transact with the service provider and the task he needs to complete may be a highly confidential one. He may not bother about the aspect. His concern would be only on the aspect. For, such scenario the user may prefer the model shown in Figure 4 whereas if his concern is mainly on the Finance rather than he may choose the model shown in Figure

4 No. of DCs Storage Space No. of V.Ms V.M Cost Storage Cost Data Transfer Cost No. of Processors Processor Speed (RAM) Degree of Physical Internal Network Understandability Easability Flexibility Figure 3 Hierarchical Model based on Finance No. of DCs Storage Space No. of V.Ms Physical Internal Network No. of Processors Processor Speed (RAM) Degree of V.M Cost Storage Cost Data Transfer Cost Understandability Easability Flexibility Figure 4 Hierarchical Model based on 1105

5 The hierarchical models shown in Figures 3 and 4 have three stages and works as follows: If Finance parameter is more important then as shown in Figure 3 the Finance and FIS gets evaluated separately and the, and FIS gets evaluated separately and finally the trust value of the CSP plan is obtained. Likewise, if has a higher priority then as shown in Figure 4 and FIS gets evaluated as one set and, and FIS gets evaluated as another set to obtain the trust value corresponding to a CSP plan. When compared with the model shown in Figure 2 which requires 3125 rules in the second stage, the hierarchical model requires only 175 rules including both second and third stages. 4. CSPs and their Plans The various plans provided by the following service providers: GoGrid,, Amazon EC2 and Cloudflare have been rated using the hierarchical trust model. Table 2 and Table 3 show the different plans, Data Center (DC) location across the globe and the input parameters corresponding to each service provider drawn from the published information [13, 14, 15, 16]. However, and are customer dependent and not exactly quantifiable. So, to test the model a value between 0 and 1 is assigned based on the available survey data. The information of Table 2 and 3 has been used to set up the DCs available with each CSP during the simulation. TABLE 2 CSPs and their location CSP Name of the Plans DCs and their Location GoGrid 4 plans: standard, 3 DCs : two in U.S.A, advanced, ultra, elite one in Europe 4 plans: Enhanced 8 DCs: Five in U.S.A, one, Enhanced two, two in Europe, one in one, Asia Two Amazon EC2 Cloudflare 3 Plans: Amazon EC2 Small, Amazon EC2 Medium, Amazon EC2 Large 3 Plans: Cloudflare Pro, Cloudflare Business, Cloudflare Enterprise 6 DCs: three in U.S.A, one in Europe, two in Asia 4 DCs: one in U.S.A, one in South America, two in Asia TABLE 3 Various Plans of CSPs with their Parameter Details CSP and Server type No of V.M No of DC Storage Space in T.B V.M Cost/hr($) Storage Cost / GB($) Transfer Cost / GB($) No. of Processors RAM In GB Physical Internal Network Understand ability Easability Flexibility Gogrid Standard Dedicated Server Gogrid Advanced Dedicated Server Gogrid Ultra Dedicated Server Gogrid Elite Dedicated Server Enhanced One Enhanced Two

6 Performanc e One Performanc e Two Amazon EC2 Small Amazon EC2 Medium Amazon EC2 Large Cloud flare Pro Cloud flare Business Cloud flare Enterprise Cloud Analyst Simulation and Results Cloud Analyst simulation of CSPs mentioned in Section 4 needs the User Bases (UB) to be defined randomly across the regions in the globe as described in [8] and [9]. The regions considered are the six continents labelled R0 through R5 as listed in Table 4. This UB description is kept constant throughout the simulation to analyze the performance of different CSPs under the same load. TABLE 4 UserBase Description Name Region Requests per User per Hr Data Size per Request (bytes) Peak Hrs. (GMT) Peak Hrs End (GMT) Avg Peak Users Avg Off- Peak Users UB UB UB UB UB UB UB A sample Cloud Analyst simulation setup and the results after simulation of Amazon EC2 Medium Plan are shown in Figures 5 and 6 respectively. Figure 5 Amazon EC2 Medium Simulation setup Figure 5 shows the Data Centers represented as DC numbered 1 through 18 (6 DCs each offering 3 plans, three in USA, one in Europe, two in Asia as mentioned in Table 2) and the User Bases numbered 1 through 7 located across the globe (as mentioned in Table 4). The infrastructure details of Table 3 and the UB requests of Table 4 are loaded in the configuration window of Cloud Analyst. The simulation run corresponding to each CSP plan provides the average response time, DC processing time and total cost involved in the transaction. A snapshot from Cloud Analyst simulation showing the maximum and minimum response times against each of the User Bases for the Amazon EC2 Medium plan is shown in Figure 6. Since this response time is random for every simulation, it has not been considered in the evaluation of Recommended. Table 5 lists the DC processing time and total cost obtained from the Cloud Analyst simulation for each CSP plan which has been used to obtain the Recommended. 1107

7 TABLE 5 Cloud Analyst Simulation Results DC CSP and Server Total Cost Processing type ($) Time (ms) Gogrid Standard Dedicated Server Gogrid Advanced Dedicated Server Gogrid Ultra Dedicated Server Gogrid Elite Dedicated Server Enhanced One Enhanced Two One Two Amazon EC2 Small Amazon EC2 Medium Figure 6 Amazon EC2 Medium after Simulation Amazon EC2 Large Results and Discussion 6.1 Direct and Recommended with 3 and 5 model parameters The non hierarchical models shown in Figures 1 and 2 have been modelled in simulink which in turn calls the FIS created for each parameter. Execution of the simulink model gives a set of Direct and Recommended values for each plan of CSP as listed in Table 6. It is observed that the Recommended values are higher than the Direct values as these include the recommendations or references collected from other parties in the initial trust. Addition of and parameters to the model of Figure 1 reduces the variations in the trust values for all CSPs which are as expected. Also, the plans that provide high security are clearly differentiated from the other CSPs. For example, with three parameters Gogrid Elite Dedicated Server and Amazon EC2 Large plans are rated highest in Recommended (with trust value of 0.794), but their trust values go down with five parameters, which is because of the level of security provided by these CSP plans. Cloud flare Pro Cloud flare Business Cloud flare Enterprise Direct and Recommended based on Finance/ Table 7 shows the trust values of the CSPs corresponding to the models in Figures 3 and 4. Here too the Recommended values are higher than 1108

8 the Direct values except for Two (highlighted in the Tables 6 and 7) due to higher total processing cost (in $) for the user requests (as shown in Table 5, this plan takes the highest $807.77). This is also reflected as a considerable reduction in Recommended value for the Finance based model. Another important observation is that the priority based model is better in distinguishing between various plans. This can be seen from Figure 7, which shows comparison of the recommended trust values corresponding to various plans from different models. In the non-hierarchical model, where all parameters have equal weights, trust values of all the plans (see column 2 of Table 6) fall in the range between and 0.52 (excluding 0.38) which makes it difficult to rank the CSPs. But in a priority based model with Finance / (Table 7), we can see that the range varies from to Thus we can rank the various service provider plans. Thus it is seen that with Finance as the main requirement, Gogrid Elite Dedicated Server, One, Amazon EC2 (Small, Medium, Large) and Cloud flare Enterprise plans are favourable whereas with as the main requirement One and Amazon EC2 Large would be preferable. Such a conclusion cannot be arrived at from Table 6. It may be noted that all the above results are subject to variation depending on the network load conditions. CSP and Server type TABLE 6 Values for 3 and 5 Model Parameters Three Parameters (, and ) Five Parameters (,,, and ) Direct Recommended Direct Recommended Gogrid Standard Dedicated Server Gogrid Advanced Dedicated Server Gogrid Ultra Dedicated Server Gogrid Elite Dedicated Server Enhanced One Enhanced Two One Two Amazon EC2 Small Amazon EC2 Medium Amazon EC2 Large Cloud flare Pro Cloud flare Business Cloud flare Enterprise Although the results have been described prioritizing Finance/ we would like to emphasize that the model utilizes most of the parameters listed by CSMIC to arrive at a trust value, and hence can be customized to get a trust value for a service provider by selecting parameters as per user requirement. For eg: a consumer who has security as a priority may not have focus on the. The model represented in Figures 3 and 4 can be modified by removing the respective parameter and can then be evaluated using the FIS to get the trust value of the service provider. For eg: the trust value obtained for Enhanced One considering based Recommended as shown in Figure 4 is (highlighted entry in Table 7), which increases to when we remove the Finance parameter while evaluating the trust value. Thus, the model parameters can be relaxed too as required by the user and the trust value of the CSPs can be estimated. 1109

9 TABLE 7 values for Hierarchical Models (Finance and based) CSP and Server type Finance based based Direct Recommended Direct Recommended Gogrid Standard Dedicated Server Gogrid Advanced Dedicated Server Gogrid Ultra Dedicated Server Gogrid Elite Dedicated Server Enhanced One Enhanced Two One Two Amazon EC2 Small Amazon EC2 Medium Amazon EC2 Large Cloud flare Pro Cloud flare Business Cloud flare Enterprise Figure 7 Comparison of Recommended Values 1110

10 7. Conclusion This paper proposes a hierarchical model to rate the various plans of CSPs considering,,, and parameters listed by CSMIC which provide a standardized method for measuring and comparing business services. Considering Finance as priority requirement results are obtained to compare the various plans of CSPs available in the market. Likewise by providing suitable priority to users can ensure that cloud applications are sufficiently secure. The paper also suggests the addition/dropping of parameters from the model as per the requirements of the consumer. 8. References [1] Mell P, Grance T, A NIST definition of cloud computing. National Institute of Standards and Technology. NIST SP [2] Siani Pearson, Privacy, and in Cloud Computing. HP Laboratories, Springer, June [3] Xin Liu, Gilles Tredan and Anwitaman Datta, A generic trust framework for large-scale open systems using machine learning. March [4] Mohamed Firdhous, Osman Ghazali and Suhaidi Hassan, Management in Cloud Computing: A Critical Review. International Journal on Advances in ICT for Emerging Regions, 2011, 04 (02): [5] Kui Ren, Cong Wang, and Qian Wang, Challenges for the Public Cloud. Illinois Institute of Technology, February [6] Somesh Kumar Prajapati, Suvamoy Changder and Anirban Sarkar, Management Model For Cloud Computing Environment. Proceedings of the International Conference on Computing. Communication and Advanced Network - ICCCAN [7]Liu Xin, beyond reputation: Novel trust mechanisms for distributed environments. A thesis report, [8] Supriya M, Venkataramana L.J, K Sangeeta and G K Patra, Estimating Value for Cloud Service Providers using Logic. International Journal of Computer Applications, Volume 48 No.19, June [9] Supriya M, K Sangeeta and G K Patra, Comparison of Cloud Service Providers Based on Direct and Recommended Rating. IEEE CONECCT, January [10] d5f13-f40e-47ad-b9a64f246cf7e34f, Cloud Service Management Index Consortium (CSMIC). Service Management Index Version 1.0 (PDF), September [11] Logic Toolbox User s Guide. [12] Wickremasinghe, B, Calheiros R.N and Buyya, R. CloudAnalyst: A CloudSim-Based Visual Modeller for Analyzing Cloud Computing Environments and Applications 24 th International Conference on Advanced Information Networking And Applications, Australia, April [13] GoGrid Cloud Hosting: Dedicated Servers, Physical Servers. [14] ions RackSpace: Dedicated Server, Managed Hosting and Web Hosting Configurations. [15] different entities. [16] types/pricing/ Cloudflare services. 1111

Comparison of Trust Values using Triangular and Gaussian Fuzzy Membership Functions for Infrastructure as a Service

Comparison of Trust Values using Triangular and Gaussian Fuzzy Membership Functions for Infrastructure as a Service Proc. of Int. Conf. on Advances in Communication, Network, and Computing, CNC Comparison of Trust Values using Triangular and Gaussian Fuzzy Membership Functions for Infrastructure as a Service A. Supriya

More information

Estimating Trust Value for Cloud Service Providers using Fuzzy Logic

Estimating Trust Value for Cloud Service Providers using Fuzzy Logic Estimating Trust Value for Cloud Service Providers using Fuzzy Logic Supriya M, Venkataramana L.J, K Sangeeta Department of Computer Science and Engineering, Amrita School of Engineering Kasavanahalli,

More information

A Proposed Service Broker Strategy in CloudAnalyst for Cost-Effective Data Center Selection

A Proposed Service Broker Strategy in CloudAnalyst for Cost-Effective Data Center Selection A Proposed Service Broker Strategy in CloudAnalyst for Cost-Effective Selection Dhaval Limbani*, Bhavesh Oza** *(Department of Information Technology, S. S. Engineering College, Bhavnagar) ** (Department

More information

A Trust-Evaluation Metric for Cloud applications

A Trust-Evaluation Metric for Cloud applications A Trust-Evaluation Metric for Cloud applications Mohammed Alhamad, Tharam Dillon, and Elizabeth Chang Abstract Cloud services are becoming popular in terms of distributed technology because they allow

More information

Round Robin with Server Affinity: A VM Load Balancing Algorithm for Cloud Based Infrastructure

Round Robin with Server Affinity: A VM Load Balancing Algorithm for Cloud Based Infrastructure J Inf Process Syst, Vol.9, No.3, September 2013 pissn 1976-913X eissn 2092-805X http://dx.doi.org/10.3745/jips.2013.9.3.379 Round Robin with Server Affinity: A VM Load Balancing Algorithm for Cloud Based

More information

Trustworthy Cloud Service Provider Selection using Multi Criteria Decision Making Methods

Trustworthy Cloud Service Provider Selection using Multi Criteria Decision Making Methods Trustworthy Cloud Service Provider Selection using Multi Criteria Decision Making Methods Supriya M *, Sangeeta K, G K Patra Abstract Cloud Computing is a specialized form of Distributed computing in which

More information

Keywords: Cloudsim, MIPS, Gridlet, Virtual machine, Data center, Simulation, SaaS, PaaS, IaaS, VM. Introduction

Keywords: Cloudsim, MIPS, Gridlet, Virtual machine, Data center, Simulation, SaaS, PaaS, IaaS, VM. Introduction Vol. 3 Issue 1, January-2014, pp: (1-5), Impact Factor: 1.252, Available online at: www.erpublications.com Performance evaluation of cloud application with constant data center configuration and variable

More information

Efficient Service Broker Policy For Large-Scale Cloud Environments

Efficient Service Broker Policy For Large-Scale Cloud Environments www.ijcsi.org 85 Efficient Service Broker Policy For Large-Scale Cloud Environments Mohammed Radi Computer Science Department, Faculty of Applied Science Alaqsa University, Gaza Palestine Abstract Algorithms,

More information

Permanent Link: http://espace.library.curtin.edu.au/r?func=dbin-jump-full&local_base=gen01-era02&object_id=154091

Permanent Link: http://espace.library.curtin.edu.au/r?func=dbin-jump-full&local_base=gen01-era02&object_id=154091 Citation: Alhamad, Mohammed and Dillon, Tharam S. and Wu, Chen and Chang, Elizabeth. 2010. Response time for cloud computing providers, in Kotsis, G. and Taniar, D. and Pardede, E. and Saleh, I. and Khalil,

More information

CDBMS Physical Layer issue: Load Balancing

CDBMS Physical Layer issue: Load Balancing CDBMS Physical Layer issue: Load Balancing Shweta Mongia CSE, School of Engineering G D Goenka University, Sohna Shweta.mongia@gdgoenka.ac.in Shipra Kataria CSE, School of Engineering G D Goenka University,

More information

RANKING THE CLOUD SERVICES BASED ON QOS PARAMETERS

RANKING THE CLOUD SERVICES BASED ON QOS PARAMETERS RANKING THE CLOUD SERVICES BASED ON QOS PARAMETERS M. Geetha 1, K. K. Kanagamathanmohan 2, Dr. C. Kumar Charlie Paul 3 Department of Computer Science, Anna University Chennai. A.S.L Paul s College of Engineering

More information

Comparison of Dynamic Load Balancing Policies in Data Centers

Comparison of Dynamic Load Balancing Policies in Data Centers Comparison of Dynamic Load Balancing Policies in Data Centers Sunil Kumar Department of Computer Science, Faculty of Science, Banaras Hindu University, Varanasi- 221005, Uttar Pradesh, India. Manish Kumar

More information

SMICloud: A Framework for Comparing and Ranking Cloud Services

SMICloud: A Framework for Comparing and Ranking Cloud Services 2011 Fourth IEEE International Conference on Utility and Cloud Computing SMICloud: A Framework for Comparing and Ranking Cloud Services Saurabh Kumar Garg, Steve Versteeg and Rajkumar Buyya Cloud Computing

More information

004.738.5:378.091.214.18 ADJUSTING THE MASSIVELY OPEN ONLINE COURSES IN CLOUD COMPUTING ENVIRONMENT 9

004.738.5:378.091.214.18 ADJUSTING THE MASSIVELY OPEN ONLINE COURSES IN CLOUD COMPUTING ENVIRONMENT 9 004.738.5:378.091.214.18 ADJUSTING THE MASSIVELY OPEN ONLINE COURSES IN CLOUD COMPUTING ENVIRONMENT 9 Aleksandar Karadimce, MSc University of information science and technology St. Paul the Apostle Ohrid,

More information

Cloud Computing Simulation Using CloudSim

Cloud Computing Simulation Using CloudSim Cloud Computing Simulation Using CloudSim Ranjan Kumar #1, G.Sahoo *2 # Assistant Professor, Computer Science & Engineering, Ranchi University, India Professor & Head, Information Technology, Birla Institute

More information

Reallocation and Allocation of Virtual Machines in Cloud Computing Manan D. Shah a, *, Harshad B. Prajapati b

Reallocation and Allocation of Virtual Machines in Cloud Computing Manan D. Shah a, *, Harshad B. Prajapati b Proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA-14) Reallocation and Allocation of Virtual Machines in Cloud Computing Manan

More information

Amazon EC2 XenApp Scalability Analysis

Amazon EC2 XenApp Scalability Analysis WHITE PAPER Citrix XenApp Amazon EC2 XenApp Scalability Analysis www.citrix.com Table of Contents Introduction...3 Results Summary...3 Detailed Results...4 Methods of Determining Results...4 Amazon EC2

More information

International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-0056. Volume: 02 Issue: 05 Aug-2015 www.irjet.net p-issn: 2395-0072

International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-0056. Volume: 02 Issue: 05 Aug-2015 www.irjet.net p-issn: 2395-0072 Fear of Cloud Vinnakota Saran Chaitanya 1, G. Harshavardhan Reddy 2 1 UG Final year student, Department of Computer Science and Engineering, G. Pulla Reddy Engineering College, Andhra Pradesh, India 2

More information

Security Considerations for Public Mobile Cloud Computing

Security Considerations for Public Mobile Cloud Computing Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of

More information

Service Broker Algorithm for Cloud-Analyst

Service Broker Algorithm for Cloud-Analyst Service Broker Algorithm for Cloud-Analyst Rakesh Kumar Mishra, Sreenu Naik Bhukya Department of Computer Science & Engineering National Institute of Technology Calicut, India Abstract Cloud computing

More information

RANKING OF CLOUD SERVICE PROVIDERS IN CLOUD

RANKING OF CLOUD SERVICE PROVIDERS IN CLOUD RANKING OF CLOUD SERVICE PROVIDERS IN CLOUD C.S. RAJARAJESWARI, M. ARAMUDHAN Research Scholar, Bharathiyar University,Coimbatore, Tamil Nadu, India. Assoc. Professor, Department of IT, PKIET, Karaikal,

More information

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining

More information

A Secure System Development Framework for SaaS Applications in Cloud Computing

A Secure System Development Framework for SaaS Applications in Cloud Computing A Secure System Development Framework for SaaS Applications in Cloud Computing Eren TATAR, Emrah TOMUR AbstractThe adoption of cloud computing is ever increasing through its economical and operational

More information

LOAD BALANCING OF USER PROCESSES AMONG VIRTUAL MACHINES IN CLOUD COMPUTING ENVIRONMENT

LOAD BALANCING OF USER PROCESSES AMONG VIRTUAL MACHINES IN CLOUD COMPUTING ENVIRONMENT LOAD BALANCING OF USER PROCESSES AMONG VIRTUAL MACHINES IN CLOUD COMPUTING ENVIRONMENT 1 Neha Singla Sant Longowal Institute of Engineering and Technology, Longowal, Punjab, India Email: 1 neha.singla7@gmail.com

More information

High performance computing network for cloud environment using simulators

High performance computing network for cloud environment using simulators High performance computing network for cloud environment using simulators Ajith Singh. N 1 and M. Hemalatha 2 1 Ph.D, Research Scholar (CS), Karpagam University, Coimbatore, India 2 Prof & Head, Department

More information

Cloud deployment model and cost analysis in Multicloud

Cloud deployment model and cost analysis in Multicloud IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) ISSN: 2278-2834, ISBN: 2278-8735. Volume 4, Issue 3 (Nov-Dec. 2012), PP 25-31 Cloud deployment model and cost analysis in Multicloud

More information

Throtelled: An Efficient Load Balancing Policy across Virtual Machines within a Single Data Center

Throtelled: An Efficient Load Balancing Policy across Virtual Machines within a Single Data Center Throtelled: An Efficient Load across Virtual Machines within a Single ata Center Mayanka Gaur, Manmohan Sharma epartment of Computer Science and Engineering, Mody University of Science and Technology,

More information

An Efficient Cloud Service Broker Algorithm

An Efficient Cloud Service Broker Algorithm An Efficient Cloud Service Broker Algorithm 1 Gamal I. Selim, 2 Rowayda A. Sadek, 3 Hend Taha 1 College of Engineering and Technology, AAST, dgamal55@yahoo.com 2 Faculty of Computers and Information, Helwan

More information

WEIGHTED ROUND ROBIN POLICY FOR SERVICE BROKERS IN A CLOUD ENVIRONMENT

WEIGHTED ROUND ROBIN POLICY FOR SERVICE BROKERS IN A CLOUD ENVIRONMENT WEIGHTED ROUND ROBIN POLICY FOR SERVICE BROKERS IN A CLOUD ENVIRONMENT MOHAMMED RADI Computer Science Department,Faculty of Applied Science Alaqsa University, Gaza Moh_radi@alaqsa.edu.ps ABSTRACT Cloud

More information

Cloud Computing and Amazon Web Services

Cloud Computing and Amazon Web Services Cloud Computing and Amazon Web Services Gary A. McGilvary edinburgh data.intensive research 1 OUTLINE 1. An Overview of Cloud Computing 2. Amazon Web Services 3. Amazon EC2 Tutorial 4. Conclusions 2 CLOUD

More information

CloudAnalyst: A CloudSim-based Tool for Modelling and Analysis of Large Scale Cloud Computing Environments

CloudAnalyst: A CloudSim-based Tool for Modelling and Analysis of Large Scale Cloud Computing Environments 433-659 DISTRIBUTED COMPUTING PROJECT, CSSE DEPT., UNIVERSITY OF MELBOURNE CloudAnalyst: A CloudSim-based Tool for Modelling and Analysis of Large Scale Cloud Computing Environments MEDC Project Report

More information

A Load Balancing Model Based on Cloud Partitioning for the Public Cloud

A Load Balancing Model Based on Cloud Partitioning for the Public Cloud International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 16 (2014), pp. 1605-1610 International Research Publications House http://www. irphouse.com A Load Balancing

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 4, July-Aug 2014

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 4, July-Aug 2014 RESEARCH ARTICLE An Efficient Service Broker Policy for Cloud Computing Environment Kunal Kishor 1, Vivek Thapar 2 Research Scholar 1, Assistant Professor 2 Department of Computer Science and Engineering,

More information

CloudAnalyst: A CloudSim-based Visual Modeller for Analysing Cloud Computing Environments and Applications

CloudAnalyst: A CloudSim-based Visual Modeller for Analysing Cloud Computing Environments and Applications CloudAnalyst: A CloudSim-based Visual Modeller for Analysing Cloud Computing Environments and Applications Bhathiya Wickremasinghe 1, Rodrigo N. Calheiros 2, and Rajkumar Buyya 1 1 The Cloud Computing

More information

Cloud Computing: The Next Computing Paradigm

Cloud Computing: The Next Computing Paradigm Cloud Computing: The Next Computing Paradigm Ronnie D. Caytiles 1, Sunguk Lee and Byungjoo Park 1 * 1 Department of Multimedia Engineering, Hannam University 133 Ojeongdong, Daeduk-gu, Daejeon, Korea rdcaytiles@gmail.com,

More information

DEFINING CLOUD COMPUTING: AN ATTEMPT AT GIVING THE CLOUD AN IDENTITY. adnan_khalid56@hotmail.com

DEFINING CLOUD COMPUTING: AN ATTEMPT AT GIVING THE CLOUD AN IDENTITY. adnan_khalid56@hotmail.com DEFINING CLOUD COMPUTING: AN ATTEMPT AT GIVING THE CLOUD AN IDENTITY Adnan Khalid* a,dr. Muhammad Shahbaz b, Dr. Athar Masood c d Department of Computer Science, Government College University Lahore, Pakistan,

More information

OCRP Implementation to Optimize Resource Provisioning Cost in Cloud Computing

OCRP Implementation to Optimize Resource Provisioning Cost in Cloud Computing OCRP Implementation to Optimize Resource Provisioning Cost in Cloud Computing K. Satheeshkumar PG Scholar K. Senthilkumar PG Scholar A. Selvakumar Assistant Professor Abstract- Cloud computing is a large-scale

More information

2) Xen Hypervisor 3) UEC

2) Xen Hypervisor 3) UEC 5. Implementation Implementation of the trust model requires first preparing a test bed. It is a cloud computing environment that is required as the first step towards the implementation. Various tools

More information

A Broker Based Trust Model for Cloud Computing Environment

A Broker Based Trust Model for Cloud Computing Environment A Broker Based Trust Model for Cloud Computing Environment Chaitali Uikey 1, Dr. D. S. Bhilare 2 1 School of Computer Science & IT, DAVV, Indore, MP. India 2 Computer Center, DAVV, Indore, MP. India Abstract

More information

A Proposed Service Broker Policy for Data Center Selection in Cloud Environment with Implementation

A Proposed Service Broker Policy for Data Center Selection in Cloud Environment with Implementation A Service Broker Policy for Data Center Selection in Cloud Environment with Implementation Dhaval Limbani*, Bhavesh Oza** *(Department of Information Technology, S. S. Engineering College, Bhavnagar) **

More information

EFFICIENT VM LOAD BALANCING ALGORITHM FOR A CLOUD COMPUTING ENVIRONMENT

EFFICIENT VM LOAD BALANCING ALGORITHM FOR A CLOUD COMPUTING ENVIRONMENT EFFICIENT VM LOAD BALANCING ALGORITHM FOR A CLOUD COMPUTING ENVIRONMENT Jasmin James, 38 Sector-A, Ambedkar Colony, Govindpura, Bhopal M.P Email:james.jasmin18@gmail.com Dr. Bhupendra Verma, Professor

More information

Abstract 1. INTRODUCTION

Abstract 1. INTRODUCTION Abstract CLOUD COMPUTING GauravBawa & Sheena Girdhar DAV Institute of Engineering and Technology, Jalandhar Email: gaurav.daviet@yahoo.com, sheenagirdhar@gmail.com Contact Numbers: 09417614654,09914658188

More information

Analysis of Service Broker Policies in Cloud Analyst Framework

Analysis of Service Broker Policies in Cloud Analyst Framework Journal of The International Association of Advanced Technology and Science Analysis of Service Broker Policies in Cloud Analyst Framework Ashish Sankla G.B Pant Govt. Engineering College, Computer Science

More information

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University

More information

Privacy preserving technique to secure cloud

Privacy preserving technique to secure cloud Vitthal S. Gutte Pune University, MIT College of engineering, Kothrud, Pune 411038, India vitthalgutte2014@gmail.com Privacy preserving technique to secure cloud Prof. Priya Deshpande Pune University,

More information

How To Understand Cloud Usability

How To Understand Cloud Usability Published in proceedings of HCI International 2015 Framework for Cloud Usability Brian Stanton 1, Mary Theofanos 1, Karuna P Joshi 2 1 National Institute of Standards and Technology, Gaithersburg, MD,

More information

Cloud Computing. Chapter 1 Introducing Cloud Computing

Cloud Computing. Chapter 1 Introducing Cloud Computing Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization

More information

How To Test For Performance And Scalability On A Server With A Multi-Core Computer (For A Large Server)

How To Test For Performance And Scalability On A Server With A Multi-Core Computer (For A Large Server) Scalability Results Select the right hardware configuration for your organization to optimize performance Table of Contents Introduction... 1 Scalability... 2 Definition... 2 CPU and Memory Usage... 2

More information

What Is It? Business Architecture Research Challenges Bibliography. Cloud Computing. Research Challenges Overview. Carlos Eduardo Moreira dos Santos

What Is It? Business Architecture Research Challenges Bibliography. Cloud Computing. Research Challenges Overview. Carlos Eduardo Moreira dos Santos Research Challenges Overview May 3, 2010 Table of Contents I 1 What Is It? Related Technologies Grid Computing Virtualization Utility Computing Autonomic Computing Is It New? Definition 2 Business Business

More information

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University Cloud Computing: Opportunities, Challenges, and Solutions Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University What is cloud computing? What are some of the keywords? How many of you cannot

More information

CSE543 Computer and Network Security Module: Cloud Computing

CSE543 Computer and Network Security Module: Cloud Computing CSE543 Computer and Network Security Module: Computing Professor Trent Jaeger 1 Computing Is Here Systems and Internet Infrastructure Security (SIIS) Laboratory 2 Computing Is Here Systems and Internet

More information

Security Model for VM in Cloud

Security Model for VM in Cloud Security Model for VM in Cloud 1 Venkataramana.Kanaparti, 2 Naveen Kumar R, 3 Rajani.S, 4 Padmavathamma M, 5 Anitha.C 1,2,3,5 Research Scholars, 4Research Supervisor 1,2,3,4,5 Dept. of Computer Science,

More information

What is Cloud Computing? Tackling the Challenges of Big Data. Tackling The Challenges of Big Data. Matei Zaharia. Matei Zaharia. Big Data Collection

What is Cloud Computing? Tackling the Challenges of Big Data. Tackling The Challenges of Big Data. Matei Zaharia. Matei Zaharia. Big Data Collection Introduction What is Cloud Computing? Cloud computing means computing resources available on demand Resources can include storage, compute cycles, or software built on top (e.g. database as a service)

More information

CLOUD COMPUTING PERFORMANCE EVALUATION: ISSUES AND CHALLENGES

CLOUD COMPUTING PERFORMANCE EVALUATION: ISSUES AND CHALLENGES CLOUD COMPUTING PERFORMANCE EVALUATION: ISSUES AND CHALLENGES Niloofar Khanghahi and Reza Ravanmehr Department of Computer Engineering, Islamic Azad University, Central Tehran Branch, Tehran, Iran ABSTRACT

More information

Nutan. N PG student. Girish. L Assistant professor Dept of CSE, CIT GubbiTumkur

Nutan. N PG student. Girish. L Assistant professor Dept of CSE, CIT GubbiTumkur Cloud Data Partitioning For Distributed Load Balancing With Map Reduce Nutan. N PG student Dept of CSE,CIT GubbiTumkur Girish. L Assistant professor Dept of CSE, CIT GubbiTumkur Abstract-Cloud computing

More information

Response Time Minimization of Different Load Balancing Algorithms in Cloud Computing Environment

Response Time Minimization of Different Load Balancing Algorithms in Cloud Computing Environment Response Time Minimization of Different Load Balancing Algorithms in Cloud Computing Environment ABSTRACT Soumya Ranjan Jena Asst. Professor M.I.E.T Dept of CSE Bhubaneswar In the vast complex world the

More information

Design of Customer-Oriented Cloud Products

Design of Customer-Oriented Cloud Products Design of Customer-Oriented Cloud Products Gülfem Isiklar Alptekin, S. Emre Alptekin Abstract Cloud computing is defined as a scalable services consumption and delivery platform that allows enterprises

More information

Auto-Scaling Model for Cloud Computing System

Auto-Scaling Model for Cloud Computing System Auto-Scaling Model for Cloud Computing System Che-Lun Hung 1*, Yu-Chen Hu 2 and Kuan-Ching Li 3 1 Dept. of Computer Science & Communication Engineering, Providence University 2 Dept. of Computer Science

More information

Privacy Preserving Public Auditing for Data in Cloud Storage

Privacy Preserving Public Auditing for Data in Cloud Storage Privacy Preserving Public Auditing for Data in Cloud Storage M.Priya 1, E. Anitha 2, V.Murugalakshmi 3 M.E, Department of CSE, Karpagam University, Coimbatore, Tamilnadu, India 1, 3 M.E, Department of

More information

SLA-based Admission Control for a Software-as-a-Service Provider in Cloud Computing Environments

SLA-based Admission Control for a Software-as-a-Service Provider in Cloud Computing Environments SLA-based Admission Control for a Software-as-a-Service Provider in Cloud Computing Environments Linlin Wu, Saurabh Kumar Garg, and Rajkumar Buyya Cloud Computing and Distributed Systems (CLOUDS) Laboratory

More information

A NOVEL LOAD BALANCING STRATEGY FOR EFFECTIVE UTILIZATION OF VIRTUAL MACHINES IN CLOUD

A NOVEL LOAD BALANCING STRATEGY FOR EFFECTIVE UTILIZATION OF VIRTUAL MACHINES IN CLOUD Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.862

More information

DESIGN OF AGENT BASED SYSTEM FOR MONITORING AND CONTROLLING SLA IN CLOUD ENVIRONMENT

DESIGN OF AGENT BASED SYSTEM FOR MONITORING AND CONTROLLING SLA IN CLOUD ENVIRONMENT International Journal of Advanced Technology in Engineering and Science www.ijates.com DESIGN OF AGENT BASED SYSTEM FOR MONITORING AND CONTROLLING SLA IN CLOUD ENVIRONMENT Sarwan Singh 1, Manish Arora

More information

SURVEY OF ADAPTING CLOUD COMPUTING IN HEALTHCARE

SURVEY OF ADAPTING CLOUD COMPUTING IN HEALTHCARE SURVEY OF ADAPTING CLOUD COMPUTING IN HEALTHCARE H.Madhusudhana Rao* Md. Rahmathulla** Dr. B Rambhupal Reddy*** Abstract: This paper targets on the productivity of cloud computing technology in healthcare

More information

yvette@yvetteagostini.it yvette@yvetteagostini.it

yvette@yvetteagostini.it yvette@yvetteagostini.it 1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work

More information

REVIEW OF SECURITY AND PRIVACY ISSUES IN CLOUD STORAGE SYSTEM

REVIEW OF SECURITY AND PRIVACY ISSUES IN CLOUD STORAGE SYSTEM International Journal of Computer Science and Engineering (IJCSE) ISSN(P): 2278-9960; ISSN(E): 2278-9979 Vol. 2, Issue 5, Nov 2013, 55-60 IASET REVIEW OF SECURITY AND PRIVACY ISSUES IN CLOUD STORAGE SYSTEM

More information

A Proposed Framework for Ranking and Reservation of Cloud Services Based on Quality of Service

A Proposed Framework for Ranking and Reservation of Cloud Services Based on Quality of Service II,III A Proposed Framework for Ranking and Reservation of Cloud Services Based on Quality of Service I Samir.m.zaid, II Hazem.m.elbakry, III Islam.m.abdelhady I Dept. of Geology, Faculty of Sciences,

More information

INTEROPERABLE FEATURES CLASSIFICATION TECHNIQUE FOR CLOUD BASED APPLICATION USING FUZZY SYSTEMS

INTEROPERABLE FEATURES CLASSIFICATION TECHNIQUE FOR CLOUD BASED APPLICATION USING FUZZY SYSTEMS INTEROPERABLE FEATURES CLASSIFICATION TECHNIQUE FOR CLOUD BASED APPLICATION USING FUZZY SYSTEMS * C. Saravanakumar 1 and C. Arun 2 1 Department of Computer Science and Engineering, Sathyabama University,

More information

Cloud Computing: Provide privacy and Security in Databaseas-a-Service

Cloud Computing: Provide privacy and Security in Databaseas-a-Service Cloud Computing: Provide privacy and Security in Databaseas-a-Service By Alok Kumar, Saurabh Sharma, Sandeep Saxena IIT,Mumbai,India BSACET, Mathura,India NIT,Durgapur,India Godinall.kumar1@gmail.com,

More information

An enhanced QoS Architecture based Framework for Ranking of Cloud Services

An enhanced QoS Architecture based Framework for Ranking of Cloud Services An enhanced QoS Architecture based Framework for Ranking of Cloud Services Mr.K.Saravanan #1, M.Lakshmi Kantham #2 1 Assistant Professor, 2 PG Scholar Department of Computer Science and Engineering Anna

More information

Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST

Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST Future of Cloud Computing Irena Bojanova, Ph.D. UMUC, NIST No Longer On The Horizon Essential Characteristics On-demand Self-Service Broad Network Access Resource Pooling Rapid Elasticity Measured Service

More information

Environments, Services and Network Management for Green Clouds

Environments, Services and Network Management for Green Clouds Environments, Services and Network Management for Green Clouds Carlos Becker Westphall Networks and Management Laboratory Federal University of Santa Catarina MARCH 3RD, REUNION ISLAND IARIA GLOBENET 2012

More information

Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted.

Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted. Cloud Computing Topics 1. What is the Cloud? 2. What is Cloud Computing? 3. Cloud Service Architectures 4. History of Cloud Computing 5. Advantages of Cloud Computing 6. Disadvantages of Cloud Computing

More information

A Survey on Trust Based Security and Privacy Issues of Cloud Computing Framework

A Survey on Trust Based Security and Privacy Issues of Cloud Computing Framework A Survey on Trust Based Security and Privacy Issues of Cloud Computing Framework Usvir Kaur 1 Dr. Dheerendra Singh 2 Assistant Professor, Dept. of Computer Science & Engineering, Sri Guru Granth Sahib

More information

Resource Allocation Avoiding SLA Violations in Cloud Framework for SaaS

Resource Allocation Avoiding SLA Violations in Cloud Framework for SaaS Resource Allocation Avoiding SLA Violations in Cloud Framework for SaaS Shantanu Sasane Abhilash Bari Kaustubh Memane Aniket Pathak Prof. A. A.Deshmukh University of Pune University of Pune University

More information

Certified Cloud Computing Professional Sample Material

Certified Cloud Computing Professional Sample Material Certified Cloud Computing Professional Sample Material 1. INTRODUCTION Let us get flashback of few years back. Suppose you have some important files in a system at home but, you are away from your home.

More information

How To Design A Cloud Data Storage Service For A Cloud Computer System

How To Design A Cloud Data Storage Service For A Cloud Computer System Ensuring Security Services for Data Storing and Data Sharing in Cloud Computing D. Raman 1, Bojja Vamshikrishna 2 1 Associate Professor Department of Computer Science and Engineering, Vardhaman College

More information

Dynamic Round Robin for Load Balancing in a Cloud Computing

Dynamic Round Robin for Load Balancing in a Cloud Computing Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 6, June 2013, pg.274

More information

Cloud Computing. Chapter 1 Introducing Cloud Computing

Cloud Computing. Chapter 1 Introducing Cloud Computing Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization

More information

Cloud Vendor Benchmark 2015. Price & Performance Comparison Among 15 Top IaaS Providers Part 1: Pricing. April 2015 (UPDATED)

Cloud Vendor Benchmark 2015. Price & Performance Comparison Among 15 Top IaaS Providers Part 1: Pricing. April 2015 (UPDATED) Cloud Vendor Benchmark 2015 Price & Performance Comparison Among 15 Top IaaS Providers Part 1: Pricing April 2015 (UPDATED) Table of Contents Executive Summary 3 Estimating Cloud Spending 3 About the Pricing

More information

A Study of Infrastructure Clouds

A Study of Infrastructure Clouds A Study of Infrastructure Clouds Pothamsetty Nagaraju 1, K.R.R.M.Rao 2 1 Pursuing M.Tech(CSE), Nalanda Institute of Engineering & Technology,Siddharth Nagar, Sattenapalli, Guntur., Affiliated to JNTUK,

More information

Dr. J. W. Bakal Principal S. S. JONDHALE College of Engg., Dombivli, India

Dr. J. W. Bakal Principal S. S. JONDHALE College of Engg., Dombivli, India Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Factor based Resource

More information

PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE

PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE Abstract: Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared

More information

ANALYSIS OF RISKS AND SKEPTICISM OF ORGANIZATIONAL CLOUD COMPUTING

ANALYSIS OF RISKS AND SKEPTICISM OF ORGANIZATIONAL CLOUD COMPUTING ANALYSIS OF RISKS AND SKEPTICISM OF ORGANIZATIONAL CLOUD COMPUTING Richmond Ikechukwu Ibe (Ph.D.) Assistant Professor of business Management, Jarvis Christian College, Howkins, TX United States of America

More information

A Survey on Cloud Computing

A Survey on Cloud Computing A Survey on Cloud Computing Poulami dalapati* Department of Computer Science Birla Institute of Technology, Mesra Ranchi, India dalapati89@gmail.com G. Sahoo Department of Information Technology Birla

More information

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer

More information

An Efficient Cost Calculation Mechanism for Cloud and Non Cloud Computing Environment in Java

An Efficient Cost Calculation Mechanism for Cloud and Non Cloud Computing Environment in Java 2012 International Conference on Computer Technology and Science (ICCTS 2012) IPCSIT vol. 47 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V47.31 An Efficient Cost Calculation Mechanism

More information

CLOUD SERVICE LEVEL AGREEMENTS Meeting Customer and Provider needs

CLOUD SERVICE LEVEL AGREEMENTS Meeting Customer and Provider needs CLOUD SERVICE LEVEL AGREEMENTS Meeting Customer and Provider needs Eric Simmon January 28 th, 2014 BACKGROUND Federal Cloud Computing Strategy Efficiency improvements will shift resources towards higher-value

More information

Part 1: Price Comparison Among The 10 Top Iaas Providers

Part 1: Price Comparison Among The 10 Top Iaas Providers Part 1: Price Comparison Among The 10 Top Iaas Providers Table of Contents Executive Summary 3 Estimating Cloud Spending 3 About the Pricing Report 3 Key Findings 3 The IaaS Providers 3 Provider Characteristics

More information

Choosing the Right Cloud Provider for Your Business

Choosing the Right Cloud Provider for Your Business Choosing the Right Cloud Provider for Your Business Abstract As cloud computing becomes an increasingly important part of any IT organization s delivery model, assessing and selecting the right cloud provider

More information

Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009

Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Cloud Computing 159.735 Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Table of Contents Introduction... 3 What is Cloud Computing?... 3 Key Characteristics...

More information

Cloud Computing in the Enterprise An Overview. For INF 5890 IT & Management Ben Eaton 24/04/2013

Cloud Computing in the Enterprise An Overview. For INF 5890 IT & Management Ben Eaton 24/04/2013 Cloud Computing in the Enterprise An Overview For INF 5890 IT & Management Ben Eaton 24/04/2013 Cloud Computing in the Enterprise Background Defining the Cloud Issues of Cloud Governance Issue of Cloud

More information

Mobile and Cloud computing and SE

Mobile and Cloud computing and SE Mobile and Cloud computing and SE This week normal. Next week is the final week of the course Wed 12-14 Essay presentation and final feedback Kylmämaa Kerkelä Barthas Gratzl Reijonen??? Thu 08-10 Group

More information

wu.cloud: Insights Gained from Operating a Private Cloud System

wu.cloud: Insights Gained from Operating a Private Cloud System wu.cloud: Insights Gained from Operating a Private Cloud System Stefan Theußl, Institute for Statistics and Mathematics WU Wirtschaftsuniversität Wien March 23, 2011 1 / 14 Introduction In statistics we

More information

Group Based Load Balancing Algorithm in Cloud Computing Virtualization

Group Based Load Balancing Algorithm in Cloud Computing Virtualization Group Based Load Balancing Algorithm in Cloud Computing Virtualization Rishi Bhardwaj, 2 Sangeeta Mittal, Student, 2 Assistant Professor, Department of Computer Science, Jaypee Institute of Information

More information

An Architecture Model of Sensor Information System Based on Cloud Computing

An Architecture Model of Sensor Information System Based on Cloud Computing An Architecture Model of Sensor Information System Based on Cloud Computing Pengfei You, Yuxing Peng National Key Laboratory for Parallel and Distributed Processing, School of Computer Science, National

More information

Performance Testing of a Cloud Service

Performance Testing of a Cloud Service Performance Testing of a Cloud Service Trilesh Bhurtun, Junior Consultant, Capacitas Ltd Capacitas 2012 1 Introduction Objectives Environment Tests and Results Issues Summary Agenda Capacitas 2012 2 1

More information

1. Simulation of load balancing in a cloud computing environment using OMNET

1. Simulation of load balancing in a cloud computing environment using OMNET Cloud Computing Cloud computing is a rapidly growing technology that allows users to share computer resources according to their need. It is expected that cloud computing will generate close to 13.8 million

More information

ADVANCEMENT TOWARDS PRIVACY PROCEEDINGS IN CLOUD PLATFORM

ADVANCEMENT TOWARDS PRIVACY PROCEEDINGS IN CLOUD PLATFORM INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE ADVANCEMENT TOWARDS PRIVACY PROCEEDINGS IN CLOUD PLATFORM Neela Bhuvan 1, K.Ajay Kumar 2 1 M.Tech Student, Dept of CSE, Vathsalya Institute

More information