scholarly journals AN ADAPTIVE RESOURCE SCHEDULING FRAMEWORK WITH SCHEDULE INTERVAL FILLING FOR CLOUD SERVICES

2021 ◽  
Vol 9 (2) ◽  
pp. 968-977
Author(s):  
B.SivaRama Krishna, Et. al.

Application level resource scheduling in distributed cloud computing is a significant research objective that grabbed the attention of many researchers in recent literature. Minimal resource scheduling failures, robust task completion and fair resource usage are the critical factors of the resource scheduling strategies. Hence, this manuscript proposed a scalable resource-scheduling model for distributed cloud computing environments that aimed to achieve the scheduling metrics. The proposed model called " Modified Resource Scheduling with Schedule Interval Filling " schedules the resource to respective task such that the optimal utilization of resource idle time achieved. The proposed model performs the scheduling in hierarchical order and they are optimal idle resource allocation, if no individual resource is found to allocate then it allocates optimal multiple idle resources with considerable schedule intervals filling. The experimental results evincing that the proposed model is scalable and robust under the adapted metrics.

2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Amr M. Sauber ◽  
Passent M. El-Kafrawy ◽  
Amr F. Shawish ◽  
Mohamed A. Amin ◽  
Ismail M. Hagag

The main goal of any data storage model on the cloud is accessing data in an easy way without risking its security. A security consideration is a major aspect in any cloud data storage model to provide safety and efficiency. In this paper, we propose a secure data protection model over the cloud. The proposed model presents a solution to some security issues of cloud such as data protection from any violations and protection from a fake authorized identity user, which adversely affects the security of the cloud. This paper includes multiple issues and challenges with cloud computing that impairs security and privacy of data. It presents the threats and attacks that affect data residing in the cloud. Our proposed model provides the benefits and effectiveness of security in cloud computing such as enhancement of the encryption of data in the cloud. It provides security and scalability of data sharing for users on the cloud computing. Our model achieves the security functions over cloud computing such as identification and authentication, authorization, and encryption. Also, this model protects the system from any fake data owner who enters malicious information that may destroy the main goal of cloud services. We develop the one-time password (OTP) as a logging technique and uploading technique to protect users and data owners from any fake unauthorized access to the cloud. We implement our model using a simulation of the model called Next Generation Secure Cloud Server (NG-Cloud). These results increase the security protection techniques for end user and data owner from fake user and fake data owner in the cloud.


2017 ◽  
Vol 7 (6) ◽  
pp. 2268-2272
Author(s):  
B. Heydari ◽  
M. Aajami

Due to its efficient, flexible, and dynamic substructure in information technology and service quality parameters estimation, cloud computing has become one of the most important issues in computer world. Discovering cloud services has been posed as a fundamental issue in reaching out high efficiency. In order to do one’s own operations in cloud space, any user needs to request several various services either simultaneously or according to a working routine. These services can be presented by different cloud producers or different decision-making policies. Therefore, service management is one of the important and challenging issues in cloud computing. With the advent of semantic web and practical services accordingly in cloud computing space, access to different kinds of applications has become possible. Ontology is the core of semantic web and can be used to ease the process of discovering services. A new model based on ontology has been proposed in this paper. The results indicate that the proposed model has explored cloud services based on user search results in lesser time compared to other models.


2018 ◽  
Vol 15 (2) ◽  
pp. 437-445 ◽  
Author(s):  
S. Radha ◽  
C. Nelson Kennedy Babu

At present, the cloud computing is emerging technology to run the large set of data capably, and due to fast data growth, processing of large scale data is becoming a main point of information method and customers can estimate the quality of brands of products employing the information given by new digital marketing channels in social media. Thus, every enterprise requires finding and analyzing a big amount of digital data in order to develop their reputation among the customers. Therefore, in this paper, SLA (Service Level Agreement) based BDAAs (Big Data Analytic Applications) using Adaptive Resource Scheduling and big data with cloud based sentiment analysis is proposed to provide the deep web mining, QoS and to analyze the customer behaviors about the product. In this process, the spatio-temporal compression technique can be applied to data compression for reduction of big data. The data is classified in to positive, negative or neutral by employing the SVM with lexicon dictionary based on the customers' behaviors about brand or products. In cloud computing environment, complex to the reduction of resources cost and fluctuation of resource requirements with BDAAs. As a result, it is needed to have a common Analytics as a Service (AaaS) platform that provides a BDAAs to customers in different fields as unpreserved services in a simple to utilize a way with lower cost. Therefore, SLA based BDAAs is developed to utilize the adaptive resource scheduling depending on the customer behaviors and it can provide visualization and data integrity. Our method can give privacy of cloud owner's information with help of data integrity and authentication process. Experimental results of proposed system shows that the sentiment analysis method for online product using cloud based big data is able to classify the opinions of customers accurately and effective of the algorithm in guarantee of SLA.


2019 ◽  
pp. 574-591
Author(s):  
Anas M.R. Alsobeh ◽  
Aws Abed Al Raheem Magableh ◽  
Emad M. AlSukhni

Cloud computing technology has opened an avenue to meet the critical need to securely share distributed resources and web services, and especially those that belong to clients who have sensitive data and applications. However, implementing crosscutting concerns for cloud-based applications is a challenge. This challenge stems from the nature of distributed Web-based technology architecture and infrastructure. One of the key concerns is security logic, which is scattered and tangled across all the cloud service layers. In addition, maintenance and modification of the security aspect is a difficult task. Therefore, cloud services need to be extended by enriching them with features to support adaptation so that these services can become better structured and less complex. Aspect-oriented programming is the right technical solution for this problem as it enables the required separation when implementing security features without the need to change the core code of the server or client in the cloud. Therefore, this article proposes a Runtime Reusable Weaving Model for weaving security-related crosscutting concerns through layers of cloud computing architecture. The proposed model does not require access to the source code of a cloud service and this can make it easier for the client to reuse the needed security-related crosscutting concerns. The proposed model is implemented using aspect orientation techniques to integrate cloud security solutions at the software-as-a-service layer.


Author(s):  
Dapeng Wang ◽  
Jinsong Wu

This chapter discusses and surveys the concepts, demands, requirements, solutions, opportunities, challenges, and future perspectives and potential of Carrier Grade Cloud Computing (CGCC). This chapter also introduces a carrier grade distributed cloud computing architecture and discusses the benefits and advantages of carrier grade distributed cloud computing. Unlike independent cloud service providers, telecommunication operators may integrate their conventional communications networking capabilities with the new cloud infrastructure services to provide inexpensive and high quality cloud services together with their deep understandings of, and strong relationships with, individual and enterprise customers. The relevant design requirements and challenges may include the performance, scalability, service-level agreement management, security, network optimization, and unified management. The relevant key issues in CGCC designs may include cost effective hardware and software configurations, distributed infrastructure deployment models, and operation processes.


Author(s):  
Y.P. Klots ◽  
I.V. Muliar ◽  
V.M. Cheshun ◽  
O.V. Burdyug

In the article the urgency of the problem of granting access to services of distributed cloud system is disclosed, in particular, the peer distributed cloud system is characterized. The process of interaction of the main components is provided to access the domain name web resource. It is researched that the distribution of resources between nodes of a peer distributed cloud system with the subsequent provision of services on request is implemented using the Kademlia protocol on a local network or Internet and contains processes for publishing the resource at the initial stage of its owner, replication and directly providing access to resources. Application of modern technologies of adaptive information security systems does not allow full control over the information flows of the cloud computing environment, since they function at the upper levels of the hierarchy. Therefore, to create effective mechanisms for protecting software in a cloud computing environment, it is necessary to develop new threat models and to create methods for displaying computer attacks that allow operatively to identify hidden and potentially dangerous processes of information interaction. Rules of access form the basis of security policy and include restrictions on the mechanisms of initialization processes access. Under the developed operations model, the formalized description of hidden threats is reduced to the emergence of context-dependent transitions in the multigraph transactions. The method of granting access to the services of the distributed cloud system is substantiated. It is determined that the Distributed Hash Table (DHT) infrastructure is used to find a replication node that has a replica of the requested resource or part of it. The study identified the stages of identification of the node's validation. The process of adding a new node, validating authenticity, publishing a resource, and accessing a resource is described in the form of a step-by-step sequence of actions within the framework of the method of granting access to services of a distributed cloud system by graphical description of information flows, interaction of processes of information and objects processing.


2018 ◽  
Vol 15 (1) ◽  
pp. 71-88
Author(s):  
Anas M.R. Alsobeh ◽  
Aws Abed Al Raheem Magableh ◽  
Emad M. AlSukhni

Cloud computing technology has opened an avenue to meet the critical need to securely share distributed resources and web services, and especially those that belong to clients who have sensitive data and applications. However, implementing crosscutting concerns for cloud-based applications is a challenge. This challenge stems from the nature of distributed Web-based technology architecture and infrastructure. One of the key concerns is security logic, which is scattered and tangled across all the cloud service layers. In addition, maintenance and modification of the security aspect is a difficult task. Therefore, cloud services need to be extended by enriching them with features to support adaptation so that these services can become better structured and less complex. Aspect-oriented programming is the right technical solution for this problem as it enables the required separation when implementing security features without the need to change the core code of the server or client in the cloud. Therefore, this article proposes a Runtime Reusable Weaving Model for weaving security-related crosscutting concerns through layers of cloud computing architecture. The proposed model does not require access to the source code of a cloud service and this can make it easier for the client to reuse the needed security-related crosscutting concerns. The proposed model is implemented using aspect orientation techniques to integrate cloud security solutions at the software-as-a-service layer.


2015 ◽  
pp. 1981-1998
Author(s):  
Dapeng Wang ◽  
Jinsong Wu

This chapter discusses and surveys the concepts, demands, requirements, solutions, opportunities, challenges, and future perspectives and potential of Carrier Grade Cloud Computing (CGCC). This chapter also introduces a carrier grade distributed cloud computing architecture and discusses the benefits and advantages of carrier grade distributed cloud computing. Unlike independent cloud service providers, telecommunication operators may integrate their conventional communications networking capabilities with the new cloud infrastructure services to provide inexpensive and high quality cloud services together with their deep understandings of, and strong relationships with, individual and enterprise customers. The relevant design requirements and challenges may include the performance, scalability, service-level agreement management, security, network optimization, and unified management. The relevant key issues in CGCC designs may include cost effective hardware and software configurations, distributed infrastructure deployment models, and operation processes.


Sign in / Sign up

Export Citation Format

Share Document