scholarly journals Cost Effective Hybrid Fault Tolerant Scheduling Model for Cloud Computing Environment

Author(s):  
Annabathula. Phani Sheetal ◽  
K. Ravindranath
2014 ◽  
Vol 644-650 ◽  
pp. 1822-1825
Author(s):  
Hong Liang Guo ◽  
He Long Yu

Under the cloud computing environment, massive data is widely used in many fields. In the face of cloud computing environments with massive data center, an efficient scheduling model need to be established. In order to solve massive data processing inefficiencies, redundant business systems and data silos and other issues, this paper proposes a scheduling model of migrating technology based on efficiency optimization virtual machine to meet the massive data efficiently scheduling requirements. Experimental results show that the improved algorithm can effectively advance the efficiency of cloud computing massive data scheduling, with high feasibility and applicability.


Electronics ◽  
2021 ◽  
Vol 10 (21) ◽  
pp. 2673
Author(s):  
Saba Rehman ◽  
Nida Talat Bajwa ◽  
Munam Ali Shah ◽  
Ahmad O. Aseeri ◽  
Adeel Anjum

A cloud computing environment provides a cost-effective way for the end user to store and access private data over remote storage using some Internet connection. The user has access to the data anywhere and at any time. However, the data over the cloud do not remain secure all the time. Since the data are accessible to the end user only by using the interference of a third party, it is prone to breach of authentication and integrity of the data. Moreover, cloud computing allows simultaneous users to access and retrieve their data online over different Internet connections, which leads to the exposure, leakage, and loss of a user’s sensitive data in different locations. Many algorithms and protocols have been developed to maintain the security and integrity of the data using cryptographic algorithms such as the Elliptic Curve Cryptography (ECC). This paper proposes a secure and optimized scheme for sharing data while maintaining data security and integrity over the cloud. The proposed system mainly functions by combining the ECC and the Advanced Encryption Standard (AES) method to ensure authentication and data integrity. The experimental results show that the proposed approach is efficient and yields better results when compared with existing approaches.


Sign in / Sign up

Export Citation Format

Share Document