scholarly journals ESJF Algorithm to Improve Cloud Environment

2021 ◽  
pp. 4171-4180
Author(s):  
Manal F. Younis

Nowadays, after the technological development in societies, cloud computing has become one of the most important technologies. It provides users with software, hardware, and platform as remote services over the Internet. The increasing number of cloud users has caused a critical problem in how the clients receive cloud services when the cloud is in a state of instability, as it cannot provide required services and, thus, a delay occurs. Therefore, an algorithm was proposed to provide high efficiency and stability to work, because all existing tasks must operate without delay. The proposed system is an enhancement shortest job first algorithm (ESJF) using a time slice, which works by taking a task in the shortest time first and then the longest first from the queue. Through the experimental results in decreasing the waiting and completion time of the task, as well as taking into account reducing tasks starvation, the result of the proposed ESJF algorithm was compared with the traditional shortest job first (SJF) algorithm. These algorithms were applied when all tasks arrived at the same time, and it proved that the ESJF algorithm works more efficiently compared to SJF.

2018 ◽  
pp. 910-925
Author(s):  
Kashif Munir ◽  
Sellapan Palaniappan

Cloud computing is set of resources and services offered through the internet. Cloud services are delivered from data centers located throughout the world. Enterprises are rapidly adopting cloud services for their businesses, measures need to be developed so that organizations can be assured of security in their businesses and can choose a suitable vendor for their computing needs. In this chapter we identify the most vulnerable security threats/attacks in cloud computing, which will enable both end users and vendors to know about the key security threats associated with cloud computing and propose relevant solution directives to strengthen security in the cloud environment. This chapter also discusses secure cloud architecture for organizations to strengthen the security.


Cloud computing or in other words, shared computing is a unique way of sharing resources via the Internet. It combines and extends features of parallel processing, grid computing, and distributed computing. Cloud Computing environments provide a competent way to schedule and process various jobs on remote machines. Rather than relying on local machines, Cloud users access services remotely via high-speed networks. Various users submitting jobs to be processed to Cloud would expect Quality of Service (QoS). So, currently, many researchers are proposing various heuristics that provide QoS to cloud users. The job scheduler is responsible for scheduling various jobs to its best-matched resource to achieve desired QoS. There are Service Level Agreements (SLAs) between Cloud Service Providers (CSPs) and Cloud users, which need to be followed by both the parties. Benefits would be affected in case of not complying with SLAs. In this paper various SLAs like Hard SLA, Best Effort SLA and Soft SLA are proposed. Jobs with required QoS parameters like Reliability, Execution Time and Priority are submitted to the scheduler. QoS of resources is determined by parameters like Reliability, Job Completion Time and the Cost of the resource. Schedulers then assign the Job to the best-matched resource according to specified SLA. Simulation is performed for First Fit and Best Fit heuristic approaches. Performances of both the heuristic approaches are evaluated with performance parameters like Average Resource Utilization (ARU), Success Rate of Jobs (SR) and Total Completion Time (TCT). This research work is useful for various organizations that provide various Cloud services to users who seek different levels of QoS for various applications.


Author(s):  
Kashif Munir ◽  
Sellapan Palaniappan

Cloud computing is set of resources and services offered through the internet. Cloud services are delivered from data centers located throughout the world. Enterprises are rapidly adopting cloud services for their businesses, measures need to be developed so that organizations can be assured of security in their businesses and can choose a suitable vendor for their computing needs. In this chapter we identify the most vulnerable security threats/attacks in cloud computing, which will enable both end users and vendors to know about the key security threats associated with cloud computing and propose relevant solution directives to strengthen security in the cloud environment. This chapter also discusses secure cloud architecture for organizations to strengthen the security.


2018 ◽  
pp. 856-882
Author(s):  
Indira K. ◽  
Vennila A.

The cloud computing is the term which have different services such as storage, servers, and applications which are delivered to an organization's computers and devices through the Internet for both technical and economical reasons. However they are many potential cloud users are reluctant to move to cloud computing on a large scale due to the unaddressed security issues present in cloud computing and so is increased the complexity of the infrastructures behind these services. So in this chapter, the challenges faced on both auditing and monitoring is identified. Accordingly it considers an investigation which uses to produce the major security audit issues present in cloud computing today based on a framework for security subsystems. To overcome the standards of auditing and process of auditing is briefly explained. There are also many platforms that provide cloud services also those domains are listed out with domain based monitoring process.


Author(s):  
Indira K. ◽  
Vennila A

The cloud computing is the term which have different services such as storage, servers, and applications which are delivered to an organization's computers and devices through the Internet for both technical and economical reasons. However they are many potential cloud users are reluctant to move to cloud computing on a large scale due to the unaddressed security issues present in cloud computing and so is increased the complexity of the infrastructures behind these services. So in this chapter, the challenges faced on both auditing and monitoring is identified. Accordingly it considers an investigation which uses to produce the major security audit issues present in cloud computing today based on a framework for security subsystems. To overcome the standards of auditing and process of auditing is briefly explained. There are also many platforms that provide cloud services also those domains are listed out with domain based monitoring process.


Author(s):  
Baldev Singh

Cloud computing is passing through development stage and with the passage process of development, cloud is also posing with security threats, challenges and risks. Lots of security threats, risks and challenges are directly or indirectly due to vulnerabilities in cloud environment. Virtualization is the process used in cloud computing through which software hardware is provided to the cloud users and also load balancing is possible in cloud resources and this process is also prone to various security threats and risks. Vulnerabilities and threats to the cloud services leads not only to the malpractices, misuse and exploitation of resources but also to the privacy violations and breaches in data. If these vulnerabilities are not properly identified and specific security measures are not adopted then cloud services will be adversely affected and hence there is dire need to address these vulnerabilities and threats at the cloud customer satisfaction level. In this paper various vulnerabilities and threats to the cloud computing are highlighted which are definitely instrumental to act as the basis of cloud computing security solutions.


Author(s):  
Shailendra Singh ◽  
Sunita Gond

As this is the age of technology and every day we are receiving the news about growing popularity of internet and its applications. Cloud computing is an emerging paradigm of today that is rapidly accepted by the industry/organizations/educational institutions etc. for various applications and purpose. As computing is related to distributed and parallel computing which are from a very long time in the market, but today is the world of cloud computing that reduces the cost of computing by focusing on personal computing to data center computing. Cloud computing architecture and standard provide a unique way for delivering computation services to cloud users. It is having a simple API (Application Platform Interface) to users for accessing storage, platform and hardware by paying-as-per-use basis. Services provided by cloud computing is as same as other utility oriented services like electricity bill, water, telephone etc. over shared network. There are many cloud services providers in the market for providing services like Google, Microsoft, Manjrasoft Aneka, etc.


Author(s):  
Christoph Reich ◽  
Sandra Hübner ◽  
Hendrik Kuijs

Cloud computing is used to provide users with computer resources on-demand any time over the Internet. At the Hochschule Furtwangen University (HFU) students, lecturers, and researchers can leverage cloud computing to enhance their e-learning experience. This chapter presents how cloud computing provides on-demand virtual desktops for problem solving, on-demand virtual labs for special courses, and on-demand collaboration platforms to support research groups. The focus is how cloud services can be used, how they can be integrated into the existing HFU-IT infrastructure, and how new didactic models could look.


2012 ◽  
pp. 1609-1620
Author(s):  
Anette Weisbecker

Cloud Computing has become the predominant paradigm in information technology for the use of distributed resources. It enables the Internet of Services where different provider offer services and compose services to new value added services. For the emerging service value chains the quality the services plays an important role. Therefore, beside software engineering methods aspects like quality of services, business models, and the interaction with the customer have to be considered during the development of cloud services. This chapter describes how these aspects can be integrated in the development process by combining software and service engineering methods and considering quality as a critical success factor in the design time.


Author(s):  
Kimaya Arun Ambekar ◽  
Kamatchi R.

Cloud computing is based on years of research on various computing paradigms. It provides elasticity, which is useful in the situations of uneven ICT resources demands. As the world is moving towards digitalization, the education sector is expected to meet the pace. Acquiring and maintaining the ICT resources also necessitates a huge amount of cost. Education sector as a community can use cloud services on various levels. Though the cloud is very successfully running technology, it also shows some flaws in the area of security, privacy and trust. The research demonstrates a model in which major security areas are covered like authorization, authentication, identity management, access control, privacy, data encryption, and network security. The total idea revolves around the community cloud as university at the center and other associated colleges accessing the resources. This study uses OpenStack environment to create a complete cloud environment. The validation of the model is performed using some cases and some tools.


Sign in / Sign up

Export Citation Format

Share Document