Replication and data management-based workflow scheduling algorithm for multi-cloud data centre platform

Author(s):  
Zain Ulabedin ◽  
Babar Nazir
2016 ◽  
pp. 1205-1222
Author(s):  
Mohammed A. AlZain ◽  
Alice S. Li ◽  
Ben Soh ◽  
Eric Pardede

Cloud computing is a phenomenal distributed computing paradigm that provides flexible, low-cost on-demand data management to businesses. However, this so-called outsourcing of computing resources causes business data security and privacy concerns. Although various methods have been proposed to deal with these concerns, none of these relates to multi-clouds. This paper presents a practical data management model in a public and private multi-cloud environment. The proposed model BFT-MCDB incorporates Shamir's Secret Sharing approach and Quantum Byzantine Agreement protocol to improve trustworthiness and security of business data storage, without compromising performance. The performance evaluation is carried out using a cloud computing simulator called CloudSim. The experimental results show significantly better performance in terms of data storage and data retrieval compared to other common cloud cryptographic based models. The performance evaluation based on CloudSim experiments demonstrates the feasibility of the proposed multi-cloud data management model.


2015 ◽  
Vol 5 (3) ◽  
pp. 35-52 ◽  
Author(s):  
Mohammed A. AlZain ◽  
Alice S. Li ◽  
Ben Soh ◽  
Eric Pardede

Cloud computing is a phenomenal distributed computing paradigm that provides flexible, low-cost on-demand data management to businesses. However, this so-called outsourcing of computing resources causes business data security and privacy concerns. Although various methods have been proposed to deal with these concerns, none of these relates to multi-clouds. This paper presents a practical data management model in a public and private multi-cloud environment. The proposed model BFT-MCDB incorporates Shamir's Secret Sharing approach and Quantum Byzantine Agreement protocol to improve trustworthiness and security of business data storage, without compromising performance. The performance evaluation is carried out using a cloud computing simulator called CloudSim. The experimental results show significantly better performance in terms of data storage and data retrieval compared to other common cloud cryptographic based models. The performance evaluation based on CloudSim experiments demonstrates the feasibility of the proposed multi-cloud data management model.


2018 ◽  
Vol 56 (2) ◽  
pp. 118-126 ◽  
Author(s):  
Rajat Chaudhary ◽  
Gagangeet Singh Aujla ◽  
Neeraj Kumar ◽  
Joel J.P.C. Rodrigues

Author(s):  
Rama Rani ◽  
Ritu Garg

AbstractThe enormous energy consumed by cloud data centers (CDCs) increases the carbon footprints, operational cost and decreases the system reliability, so it becomes a great challenge for CDCs providers. Dynamic voltage and frequency scaling (DVFS) is an efficient approach for energy efficiency, which reduces the operating frequency, and supply voltage of the processor during the task’s execution. Recent research shows that scaling of the supply voltage and operating frequency has negative impact on the system’s reliability as it increases transient fault rate of the resources. Thus, the system’s reliability and the energy consumption are two prime concerns in a cloud computing environment that requires attention. Most workflow scheduling algorithms in literature do not consider energy and reliability simultaneously. In this paper, we proposed the ε-fuzzy dominance based reliable green workflow scheduling (FDRGS) algorithm, which optimizes the application’s reliability and energy consumption simultaneously using the ε-fuzzy dominance mechanism. The simulation results obtained using fast Fourier transform (FFT) and gaussian elimination (GE) task graphs manifest that our scheduling algorithm is more efficient in optimizing energy consumption and lifetime system’s reliability jointly than several widely used algorithms. The proposed algorithm will help scientists and engineers for further insight into future research in the area of cloud.


2017 ◽  
Vol 4 (1) ◽  
pp. 62-66
Author(s):  
Luyen Ha Nam

From long, long time ago until nowadays information still takes a serious position for all aspect of life, fromindividual to organization. In ABC company information is somewhat very sensitive, very important. But how wekeep our information safe, well we have many ways to do that: in hard drive, removable disc etc. with otherorganizations they even have data centre to save their information. The objective of information security is to keep information safe from unwanted access. We applied Risk Mitigation Action framework on our data management system and after several months we have a result far better than before we use it: information more secure, quickly detect incidents, improve internal and external collaboration etc.


2014 ◽  
Vol 36 (7) ◽  
pp. 1485-1499 ◽  
Author(s):  
Jie SONG ◽  
Tian-Tian LI ◽  
Zhi-Liang ZHU ◽  
Yu-Bin BAO ◽  
Ge YU

2011 ◽  
Vol 30 (12) ◽  
pp. 3184-3186
Author(s):  
Ming-quan WANG ◽  
Jiong YU ◽  
Yuan TIAN ◽  
Yun HAN

Sign in / Sign up

Export Citation Format

Share Document