Implementation of an Efficient RBAC Technique of Cloud Computing in.net Environment
|
|
|
- Lindsay Hensley
- 10 years ago
- Views:
Transcription
1 Implementation of an Efficient RBAC Technique of Cloud Computing in.net Environment Ruhi Gupta Department Of Computer Science, Punjabi University, Patiala, India Abstract: Cloud Computing is flourishing day by day and it will continue in developing phase until computers and internet era is in existence. While dealing with cloud computing, a number of security and traffic related issues are confronted. Load Balancing is one of the answers to these issues. RBAC deals with such an answer. The proposed technique involves the hybrid of FCFS with RBAC technique. RBAC will assign roles to the clients and clients with a particular role can only access the particular document. Hence identity management and access management are fully implemented using this technique. Keywords: ABAC, Cloud Computing, IBAC, FCFS, RBAC I. Introduction: Cloud Computing is a platform which aims to provide shared data to its clients at the same time. It is amongst the buzzwords in today s era. Whether we open an IT magazine or open any website, cloud computing concept is everywhere. As the count of clients for the access of same data increases, catastrophe may occur. Cloud Computing offers various service models. It can be software as a service model, offering softwares on a single platform. It can be platform as a service model which offers a platform from where the softwares and data can be accessed. Or it can be infrastructure as a service which provides the security and backup services. Load balancing concept cannot lag behind while dealing with cloud computing. Load balancing can be implemented during runtime or can be predefined. When predefined, all he nodes of the network can have a fix number of load on them. But during runtime, the overloaded node can transfer its over load to the underloaded node so as to make it a balanced node. RBAC is one of the techniques of the load balancing during runtime. II. RBAC in Load Balancing: Concept of RBAC is the most captivating concept among all load balancing techniques. Through RBAC, only a limited number of clients can access the particular document thus decreasing the traffic load over a single network and increasing the security of the clouds. Restriction is put on the roles of the users, hence leading to the security of the cloud. There are various types by which the load balancing can be subdivided among which are static and dynamic techniques. RBAC is a kind of static one but along with FCFS, dynamic roles are being set for them. Access control models restrict or enable the access to any data. There are various access control models i.e. MAC (Mandatory access control model), DAC (Discretionary access control model) and RBAC (role based access control model). MAC is responsible for assigning roles to the users. DAC is responsible for checking the authorisation of the users. So RBAC is a combination of MAC and DAC. RBAC can be implemented whether by using networking environment or.net environment. The main focus is to set priority according to the roles of the various users. If one door is closed, then second door opens for its access. Hence RBAC plays an important role in Networking systems. RBAC consists of two phases: 1) One or more roles are given to the clients. 2) Roles are the cross checked. ISSN: Page120
2 RBAC has three components: Core RBAC, Hierarchal RBAC and Constrained RBAC. In Core RBAC, the user s login to the system and operations are performed by them according to their roles. In hierarchal RBAC, one client can always depend on the existence of the other. For e.g. in any company, employee can get permission only if granted by manager. This also works as a constraint RBAC. A feature of RBAC involves: 1. It provides the security of the data by limiting the roles to the users. 2. It reduces the transaction time of the data by limiting the users. 3. Backup of data can be taken. III. Related Work: Till now various researchers had developed various enhanced models of RBAC. Geetanjli et. al. [3] in the research work proposed a technique in which it was easy to migrate the tasks from one system to another. XML implementation Backup and Restoration policy was applied to have backup of the data. In this way, RBAC was made more enhanced. Parminder et. al. [1] in their research work implemented enhanced RBAC in.net environment and windows azure for database. was done in their research work. Restriction policy was applied to have more secured system. Along with the backup of data, restriction was applied on the number of transactions which made the data more secure from hackers. Er. Amandeep kaur et. al. [2] discovered a Cross Breed algorithm which involves the hybrid of FCFS, RBAC and a priority algorithm. Jason and Koch had given the main concept of RBAC by introducing the admin and the user s concept by which the load can be balanced. IV. Implementation: The proposed work involves the implementation of the RBAC with FCFS in.net environment so as to have an easy and secure access to cloud. Users first make their account in the organisation. Then RBAC is implemented i.e. roles are assigned and authorised to the users. After that, the FCFS technique is applied. This whole working is shown by the flowchart Fig. 1 below: ISSN: Page121
3 Start Design Application in ASP.Net Assign Priorities according to roles Higher Role? No Job executed at any time yes Assign Job first Operations assigned according to roles No If > 1 person with same role yes Assign jobs according to FCFS Fig.1 : Working of the technique ISSN: Page122
4 According to this flowchart which depicts the proposed work, clients first login their accounts according to the roles they have in the 1. Admin 2. President 3. GM 4. Manager Priority decreases 5. Executive organisation. For e.g. in the application developed in.net environment, roles are assigned in order of: The figure 2 shows the login page of.net. Fig. 2: Login Page After clicking on the create an account on the home page, the attributes have great role. All the attributes once submitted are stored in the database i.e. Microsoft SQL Server 2008 in this work. Attributes works in following phases: a) New Client: Every new client is assigned the new id containing the same list of attributes. It is termed as the requestor who wants to have access to the cloud. b) Job: Every client who wants to access the job that is assigned the job after checking the correct identity of the client. It is termed as the service requested by the client from the cloud. c) Conditions: It is the date and time where a particular job may or may not be available. It is not listed in the attribute category in practice. RBAC is a combination of attribute based access control i.e. ABAC and the identity based access control i.e. IBAC. These both lead to the security and saving of the time and money. After having the account, and login to the page, it is found that the admin manages as well as assigns the jobs to the various users of the organisation. It is shown by figure 3. ISSN: Page123
5 Fig. 3: Admin manages the jobs Whereas all the clients of lesser roles can only access the jobs listed by the admin. So according to the roles,. priorities are assigned. It is shown in figure4. Fig. 4: Lower Priority clients can only access the jobs ISSN: Page124
6 But the question arises, how the priority is assigned if more than 1 client with same role want to access the job? It is done via FCFS. For e.g. if any 2 executives login to access the job, then the executive who login first is assigned the job and this whole process is managed by the Admin. It is shown in figure 5. Fig. 5 : FCFS +RBAC implemented according to priority V. Conclusion and Future Scope: By the implementation of RBAC and FCFS using.net environment, the workload is reduced at a high cost. Moreover security is provided to all the clients working in an organisation. Although all these concepts are developed before, but a thorough implementation is proven in this paper using ASP.NET. Whole technique is proven to decrease the workload of the executer. But the workload can be reduced further if the RBAC is implemented using distributed environment instead of a single organisation. More work can be performed when one job execution depend on the execution of another job. References: [1] P. Singh, S. Singh, A New Advance Efficient RBAC to Enhance the Security in Cloud Computing, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 6, June 2013 [2] A.Kaur, N.Bansal, " Cross Breed job scheduling for reducing server load using RBAC at Cloud", in International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, pp , May 2013 [3] Gitanjali, S. S. Sehra, J.Singh, Policy Specification in Role based Access Control on Clouds, International Journal of Computer Applications, Volume 75 No.1, August 2013 [4] Y. Jung, M. Chung, Adaptive Security Management Model in the Cloud Computing Environment, ICACT, Feb. 7-10, 2010 [5] Z.Zhou, L. Wu, Z.Hong, Context-Aware Access Control Model for Cloud Computing, International Journal of Grid and Distributed Computing, Vol.6, No.6 (2013), pp.1-12 [6] Z.Tang, J. Wei, A.S.K. Li, R. Li, A New RBAC Based Access Control Model for Cloud Computing, Springer- Verlag Berlin Heidelberg, pp , [7] Reeja S L, Role Based Access Control Mechanism In Cloud Computing Using Co Operative Secondary Authorization Recycling Method, Volume 2, Issue 10, October [8] Abdul Raouf Khan, Access Control In Cloud Computing Environment, Vol.7, No.5, MAY ISSN: Page125
CLOUD-HOSTED PROXY BASED COLLABORATION IN MULTI- CLOUD COMPUTING ENVIRONMENTS WITH ABAC METHODS
CLOUD-HOSTED PROXY BASED COLLABORATION IN MULTI- CLOUD COMPUTING ENVIRONMENTS WITH ABAC METHODS Shilpa G S 1, Maria Navin J R 2 1 PG Student, Dept. of Computer Science and Engineering, SVCE Bangalore,
Analysis of Job Scheduling Algorithms in Cloud Computing
Analysis of Job Scheduling s in Cloud Computing Rajveer Kaur 1, Supriya Kinger 2 1 Research Fellow, Department of Computer Science and Engineering, SGGSWU, Fatehgarh Sahib, India, Punjab (140406) 2 Asst.Professor,
HYBRID ENCRYPTION FOR CLOUD DATABASE SECURITY
HYBRID ENCRYPTION FOR CLOUD DATABASE SECURITY Amanjot Kaur 1, Manisha Bhardwaj 2 1 MTech Student, Computer Science Department, LPU, Jalandhar, Punjab, India, [email protected] 2 Assistant Professor,
AN ADAPTIVE DISTRIBUTED LOAD BALANCING TECHNIQUE FOR CLOUD COMPUTING
AN ADAPTIVE DISTRIBUTED LOAD BALANCING TECHNIQUE FOR CLOUD COMPUTING Gurpreet Singh M.Phil Research Scholar, Computer Science Dept. Punjabi University, Patiala [email protected] Abstract: Cloud Computing
Review on Existing Load Balancing Techniques of Cloud Computing
Review on Existing Load Balancing Techniques of Cloud Computing #Suresh Kumar 1,M.Tech(CSE) #Ragavender 2, Associate Professor, CSE Department # Malla Reddy Engineering College, Hyderabad, TS State, INDIA
Application Based Access Control on Cloud Networks for Data Security
Application Based Access Control on Cloud Networks for Data Security Ms. Smitha P M.Tech in DCN, Department of ECE GSSSIETW, Mysuru Karnataka, India Smitha.21sn @gmail.com Mrs. Manjula G Associate. Proffesor,
Implementing XML-based Role and Schema Migration Scheme for Clouds
Implementing XML-based Role and Schema Migration Scheme for Clouds Gurleen Kaur 1, Sarbjeet Singh 2 Computer Science and Engineering, UIET Panjab University, Chandigarh, India 1 [email protected]
MANAGING OF IMMENSE CLOUD DATA BY LOAD BALANCING STRATEGY. Sara Anjum 1, B.Manasa 2
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF IMMENSE CLOUD DATA BY LOAD BALANCING STRATEGY Sara Anjum 1, B.Manasa 2 1 M.Tech Student, Dept of CSE, A.M.R. Institute
Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing
Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Survey on Load
Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing
www.ijcsi.org 227 Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing Dhuha Basheer Abdullah 1, Zeena Abdulgafar Thanoon 2, 1 Computer Science Department, Mosul University,
Various Schemes of Load Balancing in Distributed Systems- A Review
741 Various Schemes of Load Balancing in Distributed Systems- A Review Monika Kushwaha Pranveer Singh Institute of Technology Kanpur, U.P. (208020) U.P.T.U., Lucknow Saurabh Gupta Pranveer Singh Institute
Webpage: www.ijaret.org Volume 3, Issue XI, Nov. 2015 ISSN 2320-6802
An Effective VM scheduling using Hybrid Throttled algorithm for handling resource starvation in Heterogeneous Cloud Environment Er. Navdeep Kaur 1 Er. Pooja Nagpal 2 Dr.Vinay Guatum 3 1 M.Tech Student,
PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM
PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM Akmal Basha 1 Krishna Sagar 2 1 PG Student,Department of Computer Science and Engineering, Madanapalle Institute of Technology & Science, India. 2 Associate
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS *Dr Umesh Sehgal, #Shalini Guleria *Associate Professor,ARNI School of Computer Science,Arni University,[email protected]
Fair Scheduling Algorithm with Dynamic Load Balancing Using In Grid Computing
Research Inventy: International Journal Of Engineering And Science Vol.2, Issue 10 (April 2013), Pp 53-57 Issn(e): 2278-4721, Issn(p):2319-6483, Www.Researchinventy.Com Fair Scheduling Algorithm with Dynamic
ADAPTIVE LOAD BALANCING FOR CLUSTER USING CONTENT AWARENESS WITH TRAFFIC MONITORING Archana Nigam, Tejprakash Singh, Anuj Tiwari, Ankita Singhal
ADAPTIVE LOAD BALANCING FOR CLUSTER USING CONTENT AWARENESS WITH TRAFFIC MONITORING Archana Nigam, Tejprakash Singh, Anuj Tiwari, Ankita Singhal Abstract With the rapid growth of both information and users
Survey of Load Balancing Techniques in Cloud Computing
Survey of Load Balancing Techniques in Cloud Computing Nandkishore Patel 1, Ms. Jasmine Jha 2 1, 2 Department of Computer Engineering, 1, 2 L. J. Institute of Engineering and Technology, Ahmedabad, Gujarat,
Analysis of Different Access Control Mechanism in Cloud
Analysis of Different Access Control Mechanism in Cloud Punithasurya K Post Graduate Scholar Department of Information Technology Karunya University, India Jeba Priya S Lecturer Department of Information
Effective Load Balancing Based on Cloud Partitioning for the Public Cloud
Effective Load Balancing Based on Cloud Partitioning for the Public Cloud 1 T.Satya Nagamani, 2 D.Suseela Sagar 1,2 Dept. of IT, Sir C R Reddy College of Engineering, Eluru, AP, India Abstract Load balancing
A REVIEW PAPER ON LOAD BALANCING AMONG VIRTUAL SERVERS IN CLOUD COMPUTING USING CAT SWARM OPTIMIZATION
A REVIEW PAPER ON LOAD BALANCING AMONG VIRTUAL SERVERS IN CLOUD COMPUTING USING CAT SWARM OPTIMIZATION Upasana Mittal 1, Yogesh Kumar 2 1 C.S.E Student,Department of Computer Science, SUSCET, Mohali, (India)
A Novel Survey on an Intelligent and Efficient Load Balancing Techniques for Cloud Computing
A Novel Survey on an Intelligent and Efficient Load Balancing Techniques for Cloud Computing 1 Kamlesh Kumar, 2 Somil Kumar Gupta, 3 Govind Singh 1 Assistant Professor, Graphic Era Hill University, Bhimtal
Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments
Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments Abhishek Majumder, Suyel Namasudra and Samir Nath Abstract Cloud computing is an emerging and highly attractive technology
A Clustered Approach for Load Balancing in Distributed Systems
SSRG International Journal of Mobile Computing & Application (SSRG-IJMCA) volume 2 Issue 1 Jan to Feb 2015 A Clustered Approach for Load Balancing in Distributed Systems Shweta Rajani 1, Niharika Garg
AN IMPROVED PERFORMANCE ANALYSIS OF PRIORITY SCHEDULING ALGORITHM IN MODIFIED AD HOC GRID LAYER
AN IMPROVED PERFORMANCE ANALYSIS OF PRIORITY SCHEDULING ALGORITHM IN MODIFIED AD HOC GRID LAYER R. Bhaskaran 1 and V.Parthasarathy 2 1 Department of Information Technology, PSNA College of Engg. and Technology,
Proposal of Dynamic Load Balancing Algorithm in Grid System
www.ijcsi.org 186 Proposal of Dynamic Load Balancing Algorithm in Grid System Sherihan Abu Elenin Faculty of Computers and Information Mansoura University, Egypt Abstract This paper proposed dynamic load
How To Make A Secure Storage On A Mobile Device Secure
Outsourcing with secure accessibility in mobile cloud computing Monika Waghmare 1, Prof T.A.Chavan 2 Department of Information technology, Smt.Kashibai Navale College of Engineering, Pune, India. Abstract
A Novel Switch Mechanism for Load Balancing in Public Cloud
International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) A Novel Switch Mechanism for Load Balancing in Public Cloud Kalathoti Rambabu 1, M. Chandra Sekhar 2 1 M. Tech (CSE), MVR College
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 4, July-Aug 2014
RESEARCH ARTICLE An Efficient Priority Based Load Balancing Algorithm for Cloud Environment Harmandeep Singh Brar 1, Vivek Thapar 2 Research Scholar 1, Assistant Professor 2, Department of Computer Science
Dr. Ravi Rastogi Associate Professor Sharda University, Greater Noida, India
Volume 4, Issue 5, May 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Round Robin Approach
Energy Constrained Resource Scheduling for Cloud Environment
Energy Constrained Resource Scheduling for Cloud Environment 1 R.Selvi, 2 S.Russia, 3 V.K.Anitha 1 2 nd Year M.E.(Software Engineering), 2 Assistant Professor Department of IT KSR Institute for Engineering
Public Cloud Partition Balancing and the Game Theory
Statistics Analysis for Cloud Partitioning using Load Balancing Model in Public Cloud V. DIVYASRI 1, M.THANIGAVEL 2, T. SUJILATHA 3 1, 2 M. Tech (CSE) GKCE, SULLURPETA, INDIA [email protected] [email protected]
Upgrading a computer to Windows 10 with PetLinx
25 August, 2015 Upgrading a computer to Windows 10 with PetLinx Microsoft have recently released Windows 10 and offered it as a free upgrade for user of Windows 7 and 8/8.1. In most cases, computers with
Performance Analysis of Load Balancing Algorithms in Distributed System
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 1 (2014), pp. 59-66 Research India Publications http://www.ripublication.com/aeee.htm Performance Analysis of Load Balancing
Keywords Load balancing, Dispatcher, Distributed Cluster Server, Static Load balancing, Dynamic Load balancing.
Volume 5, Issue 7, July 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Hybrid Algorithm
Comparison of PBRR Scheduling Algorithm with Round Robin and Heuristic Priority Scheduling Algorithm in Virtual Cloud Environment
www.ijcsi.org 99 Comparison of PBRR Scheduling Algorithm with Round Robin and Heuristic Priority Scheduling Algorithm in Cloud Environment Er. Navreet Singh 1 1 Asst. Professor, Computer Science Department
Design and Evaluation of a Hierarchical Multi-Tenant Data Management Framework for Cloud Applications
Design and Evaluation of a Hierarchical Multi-Tenant Data Management Framework for Cloud Applications Pieter-Jan Maenhaut, Hendrik Moens, Veerle Ongenae and Filip De Turck Ghent University, Faculty of
Frontstream CRM Pro to Pro Upgrade Guide (Note: This guide is ONLY applicable for upgrading from Pro to Pro)
Frontstream CRM Pro to Pro Upgrade Guide (Note: This guide is ONLY applicable for upgrading from Pro to Pro) Congratulations on your purchase of Frontstream CRM 2015 Pro. Frontstream CRM 2015 Pro is the
Towards Securing APIs in Cloud Computing
Towards Securing APIs in Cloud Computing Kumar Gunjan #1, R. K. Tiwari *2, G. Sahoo #3 # Department of Information Technology, Birla Institute of Technology, Mesra Ranchi, India * RVS College of Engineering&
Load Balancing in Cloud Computing using Observer's Algorithm with Dynamic Weight Table
Load Balancing in Cloud Computing using Observer's Algorithm with Dynamic Weight Table Anjali Singh M. Tech Scholar (CSE) SKIT Jaipur, [email protected] Mahender Kumar Beniwal Reader (CSE & IT), SKIT
IMPROVEMENT OF RESPONSE TIME OF LOAD BALANCING ALGORITHM IN CLOUD ENVIROMENT
IMPROVEMENT OF RESPONSE TIME OF LOAD BALANCING ALGORITHM IN CLOUD ENVIROMENT Muhammad Muhammad Bala 1, Miss Preety Kaushik 2, Mr Vivec Demri 3 1, 2, 3 Department of Engineering and Computer Science, Sharda
A SURVEY ON LOAD BALANCING ALGORITHMS IN CLOUD COMPUTING
A SURVEY ON LOAD BALANCING ALGORITHMS IN CLOUD COMPUTING Harshada Raut 1, Kumud Wasnik 2 1 M.Tech. Student, Dept. of Computer Science and Tech., UMIT, S.N.D.T. Women s University, (India) 2 Professor,
Secure Role-Based Access Control on Encrypted Data in Cloud Storage using Raspberry PI
Volume: 2, Issue: 7, 20-27 July 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Miss Rohini Vidhate Savitribai Phule Pune University. Mr. V. D. Shinde Savitribai
Improving Performance and Reliability Using New Load Balancing Strategy with Large Public Cloud
Improving Performance and Reliability Using New Load Balancing Strategy with Large Public Cloud P.Gayathri Atchuta*1, L.Prasanna Kumar*2, Amarendra Kothalanka*3 M.Tech Student*1, Associate Professor*2,
DYNAMIC QUERY FORMS WITH NoSQL
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 7, Jul 2014, 157-162 Impact Journals DYNAMIC QUERY FORMS WITH
A Comparative Study of Load Balancing Algorithms in Cloud Computing
A Comparative Study of Load Balancing Algorithms in Cloud Computing Reena Panwar M.Tech CSE Scholar Department of CSE, Galgotias College of Engineering and Technology, Greater Noida, India Bhawna Mallick,
How To Perform Load Balancing In Cloud Computing With An Agent
A New Approach for Dynamic Load Balancing in Cloud Computing Anjali 1, Jitender Grover 2, Manpreet Singh 3, Charanjeet Singh 4, Hemant Sethi 5 1,2,3,4,5 (Department of Computer Science & Engineering, MM
An Online Purchase Portal for Books and Seeds in Regional Language (Punjabi)
An Online Purchase Portal for Books and Seeds in Regional Language (Punjabi) Er. Deepinder Kaur 1, Er. Salam Din 2 Department of SEEIT, PAU, Ludhiana, India 1 Associate Professor, Department of SEEIT,
Study of Virtual Side Channel Attack in Cloud Computing A Review
Study of Virtual Side Channel Attack in Cloud Computing A Review Navjot Singh Brar, Dr Kanwalvir Singh Dhindsa M.Tech (E-Security), Associate Professor Department of Computer Science and Engineering BBSBEC,
A Study on the Cloud Computing Architecture, Service Models, Applications and Challenging Issues
A Study on the Cloud Computing Architecture, Service Models, Applications and Challenging Issues Rajbir Singh 1, Vivek Sharma 2 1, 2 Assistant Professor, Rayat Institute of Engineering and Information
A Review on Load Balancing In Cloud Computing 1
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 6 June 2015, Page No. 12333-12339 A Review on Load Balancing In Cloud Computing 1 Peenaz Pathak, 2 Er.Kamna
Distributed Attribute Based Encryption for Patient Health Record Security under Clouds
Distributed Attribute Based Encryption for Patient Health Record Security under Clouds SHILPA ELSA ABRAHAM II ME (CSE) Nandha Engineering College Erode Abstract-Patient Health Records (PHR) is maintained
Cloud Analyst: An Insight of Service Broker Policy
Cloud Analyst: An Insight of Service Broker Policy Hetal V. Patel 1, Ritesh Patel 2 Student, U & P U. Patel Department of Computer Engineering, CSPIT, CHARUSAT, Changa, Gujarat, India Associate Professor,
CASE STUDY OF VEHICLE PARKING MOBILE PAYMENT APPLICATION: DATA STORAGE AND SYNCHRONIZATION SOLUTION
CASE STUDY OF VEHICLE PARKING MOBILE PAYMENT APPLICATION: DATA STORAGE AND SYNCHRONIZATION SOLUTION Jekaterina Smirnova, Nikolajs Bumanis, Gatis Vitols Latvia University of Agriculture [email protected],
Minimization of Energy Consumption Based on Various Techniques in Green Cloud Computing
Minimization of Energy Consumption Based on Various Techniques in Green Cloud Computing Jaswinder Kaur 1, Sahil Vashist 2, Rajwinder Singh 3, Gagandeep Singh 4 Student, Dept. of CSE, Chandigarh Engineering
Statistics Analysis for Cloud Partitioning using Load Balancing Model in Public Cloud
Statistics Analysis for Cloud Partitioning using Load Balancing Model in Public Cloud 1 V.DIVYASRI, M.Tech (CSE) GKCE, SULLURPETA, [email protected] 2 T.SUJILATHA, M.Tech CSE, ASSOCIATE PROFESSOR
MEASURING PERFORMANCE OF DYNAMIC LOAD BALANCING ALGORITHMS IN DISTRIBUTED COMPUTING APPLICATIONS
MEASURING PERFORMANCE OF DYNAMIC LOAD BALANCING ALGORITHMS IN DISTRIBUTED COMPUTING APPLICATIONS Priyesh Kanungo 1 Professor and Senior Systems Engineer (Computer Centre), School of Computer Science and
AUTOMATE CRAWLER TOWARDS VULNERABILITY SCAN REPORT GENERATOR
AUTOMATE CRAWLER TOWARDS VULNERABILITY SCAN REPORT GENERATOR Pragya Singh Baghel United College of Engineering & Research, Gautama Buddha Technical University, Allahabad, Utter Pradesh, India ABSTRACT
Access Control of Cloud Service Based on UCON
Access Control of Cloud Service Based on UCON Chen Danwei, Huang Xiuli, and Ren Xunyi Nanjing University of posts & Telecommunications, New Model Street No.66, 210003, Nanjing, China [email protected],
Identifying More Efficient Ways of Load balancing the Web (http) Requests.
International Journal of Allied Practice, Research and Review Website: www.ijaprr.com (ISSN 2350-1294) Identifying More Efficient Ways of Load balancing the Web (http) Requests. Mukesh Negi Project Manager,
Course 20465C: Designing a Data Solution with Microsoft SQL Server
Course 20465C: Designing a Data Solution with Microsoft SQL Server Module 1: Introduction to Enterprise Data Architecture As organizations grow to enterprise scale, their IT infrastructure requirements
CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India
CLOUD COMPUTING 1 Er. Simar Preet Singh, 2 Er. Anshu Joshi 1 Assistant Professor, Computer Science & Engineering, DAV University, Jalandhar, Punjab, India 2 Research Scholar, Computer Science & Engineering,
A Secure Load Balancing Technique based on Cloud Partitioning for Public Cloud Infrastructure Nidhi Bedi 1 and Shakti Arora 1
A Secure Load Balancing Technique based on Cloud Partitioning for Public Cloud Infrastructure Nidhi Bedi 1 and Shakti Arora 1 1 Computer Science & Engineering Department, Kurukshetra University Krurkshetra/Geeta
Windows HPC Server 2008 R2 Service Pack 3 (V3 SP3)
Windows HPC Server 2008 R2 Service Pack 3 (V3 SP3) Greg Burgess, Principal Development Manager Windows Azure High Performance Computing Microsoft Corporation HPC Server Components Job Scheduler Distributed
Improved Storage Security Scheme using RSA & Twofish Algorithm at Window Azure Cloud
Improved Storage Security Scheme using RSA & Twofish Algorithm at Window Azure Cloud Amandeep Kaur 1, Sarpreet Singh 2 1 Research Fellow, 2 Asst. Professor 1,2 Sri Guru Granth Sahib World University,Fatehgarh
Federation of Cloud Computing Infrastructure
IJSTE International Journal of Science Technology & Engineering Vol. 1, Issue 1, July 2014 ISSN(online): 2349 784X Federation of Cloud Computing Infrastructure Riddhi Solani Kavita Singh Rathore B. Tech.
Implementing Microsoft Azure Infrastructure Solutions
20533B - Version: 1 02 July 2016 Implementing Microsoft Azure Infrastructure Solutions Implementing Microsoft Azure Infrastructure Solutions 20533B - Version: 1 5 days Course Description: This course is
A Dynamic Approach for Load Balancing using Clusters
A Dynamic Approach for Load Balancing using Clusters ShwetaRajani 1, RenuBagoria 2 Computer Science 1,2,Global Technical Campus, Jaipur 1,JaganNath University, Jaipur 2 Email: [email protected] 1
Cloud Partitioning of Load Balancing Using Round Robin Model
Cloud Partitioning of Load Balancing Using Round Robin Model 1 M.V.L.SOWJANYA, 2 D.RAVIKIRAN 1 M.Tech Research Scholar, Priyadarshini Institute of Technology and Science for Women 2 Professor, Priyadarshini
Fig. 1 WfMC Workflow reference Model
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 10 (2014), pp. 997-1002 International Research Publications House http://www. irphouse.com Survey Paper on
SCORE BASED DEADLINE CONSTRAINED WORKFLOW SCHEDULING ALGORITHM FOR CLOUD SYSTEMS
SCORE BASED DEADLINE CONSTRAINED WORKFLOW SCHEDULING ALGORITHM FOR CLOUD SYSTEMS Ranjit Singh and Sarbjeet Singh Computer Science and Engineering, Panjab University, Chandigarh, India ABSTRACT Cloud Computing
ABSTRACT. KEYWORDS: Cloud Computing, Load Balancing, Scheduling Algorithms, FCFS, Group-Based Scheduling Algorithm
A REVIEW OF THE LOAD BALANCING TECHNIQUES AT CLOUD SERVER Kiran Bala, Sahil Vashist, Rajwinder Singh, Gagandeep Singh Department of Computer Science & Engineering, Chandigarh Engineering College, Landran(Pb),
Email: [email protected]. 2 Prof, Dept of CSE, Institute of Aeronautical Engineering, Hyderabad, Andhrapradesh, India,
www.semargroup.org, www.ijsetr.com ISSN 2319-8885 Vol.03,Issue.06, May-2014, Pages:0963-0968 Improving Efficiency of Public Cloud Using Load Balancing Model SHRAVAN KUMAR 1, DR. N. CHANDRA SEKHAR REDDY
A REVIEW ON LOAD BALANCING TECHNIQUE IN THE PUBLIC CLOUD USING PARTITIONING METHOD
A REVIEW ON LOAD BALANCING TECHNIQUE IN THE PUBLIC CLOUD USING PARTITIONING METHOD 1 G. DAMODAR, 2 D. BARATH KUMAR 1 M.Tech Student, Department of CSE. [email protected] 2 Assistant Professor, Department
LOAD BALANCING IN CLOUD COMPUTING USING PARTITIONING METHOD
LOAD BALANCING IN CLOUD COMPUTING USING PARTITIONING METHOD Mitesh Patel 1, Kajal Isamaliya 2, Hardik kadia 3, Vidhi Patel 4 CE Department, MEC, Surat, Gujarat, India 1 Asst.Professor, CSE Department,
Effective Load Balancing for Cloud Computing using Hybrid AB Algorithm
Effective Load Balancing for Cloud Computing using Hybrid AB Algorithm 1 N. Sasikala and 2 Dr. D. Ramesh PG Scholar, Department of CSE, University College of Engineering (BIT Campus), Tiruchirappalli,
Auto-Scaling, Load Balancing and Monitoring As service in public cloud
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 4, Ver. I (Jul-Aug. 2014), PP 39-46 Auto-Scaling, Load Balancing and Monitoring As service in public
Managing Cloud Server with Big Data for Small, Medium Enterprises: Issues and Challenges
Managing Cloud Server with Big Data for Small, Medium Enterprises: Issues and Challenges Prerita Gupta Research Scholar, DAV College, Chandigarh Dr. Harmunish Taneja Department of Computer Science and
Backup / migration of a Coffalyser.Net database
Backup / migration of a Coffalyser.Net database There are two main procedures for backup or migration of your Coffalyser.Net database. One of these procedures makes use of the SQL management studio software
AN EFFICIENT TASK SCHEDULING ALGORITHM TO OPTIMIZE RELIABILITY IN MOBILE COMPUTING
AN EFFICIENT TASK SCHEDULING ALGORITHM TO OPTIMIZE RELIABILITY IN MOBILE COMPUTING Faizul Navi Khan, Kapil Govil Teerthanker Mahaveer University, Moradabad, U.P., India ABSTRACT Mobile computing can be
AppDev OnDemand Cloud Computing Learning Library
AppDev OnDemand Cloud Computing Learning Library A full year of access to our cloud computing courses, plus future course releases included free! The AppDev OnDemand Cloud Computing Learning Library includes
BM482E Introduction to Computer Security
BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS Survey of Optimization of Scheduling in Cloud Computing Environment Er.Mandeep kaur 1, Er.Rajinder kaur 2, Er.Sughandha Sharma 3 Research Scholar 1 & 2 Department of Computer
