Security and detection mechanism in IoT-based cloud computing using hybrid approach

Author(s):  
Harshita Patel ◽  
G. Thippa Reddy ◽  
Somula Ramasubba Reddy ◽  
M. Praveen Kumar Reddy ◽  
Pradeep Chouksey ◽  
...  
Author(s):  
Megha Vashishtha ◽  
Pradeep Chouksey ◽  
Dharmendra Singh Rajput ◽  
Somula Ramasubba Reddy ◽  
M. Praveen Kumar Reddy ◽  
...  

Author(s):  
Ramandeep Kaur

A lot of research has been done in the field of cloud computing in computing domain.  For its effective performance, variety of algorithms has been proposed. The role of virtualization is significant and its performance is dependent on VM Migration and allocation. More of the energy is absorbed in cloud; therefore, the utilization of numerous algorithms is required for saving energy and efficiency enhancement in the proposed work. In the proposed work, green algorithm has been considered with meta heuristic algorithms, ABC (Artificial Bee colony .Every server has to perform different or same functions. A cloud computing infrastructure can be modelled as Primary Machineas a set of physical Servers/host PM1, PM2, PM3… PMn. The resources of cloud infrastructure can be used by the virtualization technology, which allows one to create several VMs on a physical server or host and therefore, lessens the hardware amount and enhances the resource utilization. The computing resource/node in cloud is used through the virtual machine. To address this problem, data centre resources have to be managed in resource -effective manner for driving Green Cloud computing that has been proposed in this work using Virtual machine concept with ABC and Neural Network optimization algorithm. The simulations have been carried out in CLOUDSIM environment and the parameters like SLA violations, Energy consumption and VM migrations along with their comparison with existing techniques will be performed.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Konrad Rolle ◽  
Dmytro Yaremkevich ◽  
Alexey V. Scherbakov ◽  
Manfred Bayer ◽  
George Fytas

AbstractHypersonic phononic bandgap structures confine acoustic vibrations whose wavelength is commensurate with that of light, and have been studied using either time- or frequency-domain optical spectroscopy. Pulsed pump-probe lasers are the preferred instruments for characterizing periodic multilayer stacks from common vacuum deposition techniques, but the detection mechanism requires the injected sound wave to maintain coherence during propagation. Beyond acoustic Bragg mirrors, frequency-domain studies using a tandem Fabry–Perot interferometer (TFPI) find dispersions of two- and three-dimensional phononic crystals (PnCs) even for highly disordered samples, but with the caveat that PnCs must be transparent. Here, we demonstrate a hybrid technique for overcoming the limitations that time- and frequency-domain approaches exhibit separately. Accordingly, we inject coherent phonons into a non-transparent PnC using a pulsed laser and acquire the acoustic transmission spectrum on a TFPI, where pumped appear alongside spontaneously excited (i.e. incoherent) phonons. Choosing a metallic Bragg mirror for illustration, we determine the bandgap and compare with conventional time-domain spectroscopy, finding resolution of the hybrid approach to match that of a state-of-the-art asynchronous optical sampling setup. Thus, the hybrid pump–probe technique retains key performance features of the established one and going forward will likely be preferred for disordered samples.


The distributed computing is the buzz in recent past, cloud computing stands first in this category. This is since, the users can adapt anything related to data storage, magnificent computing facilities on a system with less infrastructure from anywhere at any time. On other dimension such public and private cloud computing strategies would also attracts the foul players to perform intrusion practices. This is since, the comfortability that the cloud platform providing to end users intends them to adapt these services in regard to save or compute the sensitive data. The scope of vulnerability to breach the data or services over cloud computing is more frequent and easier, which is since, these services relies on internet protocol. In this regard, the research in intrusion detection defense mechanisms is having prominent scope. This manuscript, projecting a novel intrusion detection mechanism called "calibration factors-based intrusion detection (CFID)" for cloud computing networks. The experimental study portrayed the significant scope of the proposal CFID to detect the intrusion activities listed as remoteto-Local, Port Scanning, and Virtual-Machine-Trapping.


Author(s):  
Ahmed Subhi Abdalkafor ◽  
Khattab M. Ali Alheeti

Cloud computing plays an important role in our daily life. It has direct and positive impact on share and update data, knowledge, storage and scientific resources between various regions. Cloud computing performance heavily based on job scheduling algorithms that are utilized for queue waiting in modern scientific applications. The researchers are considered cloud computing a popular platform for new enforcements. These scheduling algorithms help in design efficient queue lists in cloud as well as they play vital role in reducing waiting for processing time in cloud computing. A novel job scheduling is proposed in this paper to enhance performance of cloud computing and reduce delay time in queue waiting for jobs. The proposed algorithm tries to avoid some significant challenges that throttle from developing applications of cloud computing. However, a smart scheduling technique is proposed in our paper to improve performance processing in cloud applications. Our experimental result of the proposed job scheduling algorithm shows that the proposed schemes possess outstanding enhancing rates with a reduction in waiting time for jobs in queue list.


2016 ◽  
Vol 133 (6) ◽  
pp. 8-11 ◽  
Author(s):  
Sahar Mohamed ◽  
Adil Yousif ◽  
Mohammed Bakri

Author(s):  
Manasa Jonnagadla

Abstract: Cloud computing provides streamlined tools for exceptional business efficiency. Cloud service providers typically offer two types of plans: reserved and on-demand. Restricted policies provide low-cost long-term contracting, while order contracts are expensive and ready for short periods. Cloud resources must be delivered wisely to meet current customer demands. Many current works rely on low-cost resource-reserved strategies, which may be under- or over-provisioning. Resource allocation has become a difficult issue due to unfairness causing high availability costs and cloud demand variability. That article suggests a hybrid approach to allocating cloud services to complex customer orders. The strategy was built in two stages: accommodation stages and a flexible structure. By treating each step as an optimization problem, we can reduce the overall implementation cost while maintaining service quality. Due to the uncertain nature of cloud requests, we set up a stochastic Optimization-based approach. Our technique is used to assign individual cloud resources and the results show its effectiveness. Keywords: Cloud computing, Resource allocation, Demand


Sign in / Sign up

Export Citation Format

Share Document