scholarly journals VM Consolidation and Migration for IAAS In Cloud Storage

Author(s):  
Saravanan S

Cloud computing is capable of handling a huge amount of growing work in a predestined manner for the usage of the business customers. The main enabling technology for cloud computing is virtualization which generalize the physical infrastructure and makes it easy to use and manage. In this project virtualization is used to allocate resources based on their needs and also supports green computing concept. “Skewness” concept is introduced here in which the same is minimized to combine various workloads to improve the utilization of the server. Managing the customer demand creates the challenges of on demand resource allocation. So can implement Virtual Machine (VM) technology has been employed for resource provisioning. It is expected that using virtualized environment will reduce the average job response time as well as executes the task according to the availability of resources. Hence VMs are allocated to the user based on characteristics of the job. The VM live migration technology makes the VM and PM (Physical machine) mapping possible when the execution is running.

Cloud acts as a database for huge amount of data. It allows users to store the information or data related items in the cloud storage and allows them to use/ their data via network connection. There are different types of cloud, Public private hybrid and community. In case of public cloud the user rents the storage and stores the data in it. There exist some trust issues in storing data in the cloud since there are many untrusted users who also rented the cloud and there is need for the encryption of data there are many ways to encrypt the data the new trend in encryption is attribute based encryption. The main advantage in attribute based encryption is that it depends on the attributes of the user which differs vastly from one user to another. This paper explains about the use of attribute based encryption in cloud and how it differs from the other encryption algorithms and it advantages over other algorithms. This paper also explains about the cipher-text policy in ABE in various aspects


Author(s):  
Mohamed Fazil Mohamed Firdhous

Cloud computing is the newest paradigm in computing that turned upside down the way of resource provisioning and payment. Cloud computing improves the resource utilization through virtualization enabling both customers as well as service providers to reap the benefits. Thus virtualization is the enabling technology that made this revolution possible. Through virtualization, it is possible to host multiple independent systems on a single hardware without interfering with each other. Server virtualization techniques can be grouped based how the underlying hardware and operating systems are presented to the users. In this chapter, the author takes an in depth look at how different virtualization has been implemented along with their security and quality of service issues.


Author(s):  
Mohamed Fazil Mohamed Firdhous

Cloud computing is the newest paradigm in computing that turned upside down the way of resource provisioning and payment. Cloud computing improves the resource utilization through virtualization enabling both customers as well as service providers to reap the benefits. Thus, virtualization is the enabling technology that made this revolution possible. Through virtualization, it is possible to host multiple independent systems on a single hardware without interfering with each other. Server virtualization techniques can be grouped based how the underlying hardware and operating systems are presented to the users. In this chapter, the author takes an in depth look at how different virtualization has been implemented along with their security and quality of service issues.


Author(s):  
M. Murugesan

Cloud computing is able to managing a massive quantity of growing work for the use of enterprise clients in a specified way Virtualization, which makes assumptions the network resources and makes it simple to control, is an important enabling technology for cloud computing. Computing is being used in the proposed work to distribute cloud services tailored to the needs and to promote the smart grid principle. “Skewness” concept was delivered here wherein equal was reducing to combine workloads to enhance the usage of the server. The complexities of on-demand allocation of resources arise from managing customer demands. As a result, the use of vms technologies has proved to be helpful in terms of resource provisioning. The use of virtualized environments is expected to reduce primarily consist connection speed while also executing tasks in accordance with cloud resource availability. This implementation can be use local negotiation based VM consolidation mechanism to predict each job request and reduce overloads to create virtual space at the time of multiple requests. The proposed system implement co-location approach to combine unused small spaces to create new virtual space for improves the performance of server. Also implement self-destruction approach to eliminate the invalid data based on time to live property.  The proposed framework is executed in genuine time with effective asset allotment. In this system to begin with broaden a forecast show which will gauge the parcel sizes of decrease commitments at runtime. And it can detect information skewness in real time and allocate extra asses for mordant of large walls that help us complete faster.


Author(s):  
Neha Thakur ◽  
Aman Kumar Sharma

Cloud computing has been envisioned as the definite and concerning solution to the rising storage costs of IT Enterprises. There are many cloud computing initiatives from IT giants such as Google, Amazon, Microsoft, IBM. Integrity monitoring is essential in cloud storage for the same reasons that data integrity is critical for any data centre. Data integrity is defined as the accuracy and consistency of stored data, in absence of any alteration to the data between two updates of a file or record.  In order to ensure the integrity and availability of data in Cloud and enforce the quality of cloud storage service, efficient methods that enable on-demand data correctness verification on behalf of cloud users have to be designed. To overcome data integrity problem, many techniques are proposed under different systems and security models. This paper will focus on some of the integrity proving techniques in detail along with their advantages and disadvantages.


2017 ◽  
Author(s):  
J Deepika ◽  
A P Nivedha Sri ◽  
R Niladevi ◽  
S Sandhiya

2017 ◽  
Vol 90 ◽  
pp. 83-89 ◽  
Author(s):  
Tin-Yu Wu ◽  
Nadra Guizani ◽  
Jhih-Siang Huang

2020 ◽  
Vol 1 (2) ◽  
pp. 1-5
Author(s):  
Bibek Naha ◽  
Siddhartha Banerjee ◽  
Sayanti Mondal

Cloud Computing is one of the most nurtured as well as debated topic in today’s world. Billions of data of various fields ranging from personal users to large business enterprises reside in Cloud. Therefore, availability of this huge amount of data and services is of immense importance. The DOS (Denial of Service) attack is a well-known threat to the availability of data in a smaller premise. Whenever, it’s a Cloud environment this simple DOS attack takes the form of DDOS (Distributed Denial of Service) attack. This paper provides a generic insight into the various kinds of DOS as well as DDOS attacks. Moreover, a handful of countermeasures have also been depicted here. In a nutshell, it aims at raising an awareness by outlining a clear picture of the Cloud availability issues.Our paper gives a comparative study of different techniques of detecting DOS.


Sign in / Sign up

Export Citation Format

Share Document