scholarly journals An Efficient Resource Provisioned Technique in Cloud Computing Environment.

Different ICT-empowered service providers additionally have either embraced distributed computing or began moving administrations to cloud framework. Be that as it may, the expanding interest for cloud based foundation has come about into extreme issue of managing the resources and adjusting of load for cloud specialist providers and customers. Specialists have recommended various resource provisioning techniques for effective resource usage. An epic burden adjusting procedure addressing the movement of the outstanding task at hand from over-stacked VM to gently stacked VM in distributed computing conditions is presented in this paper. An undertaking is made to help the cloud accomplices to beat the imbalanced asset utilization issue is shown in this paper.

2019 ◽  
Vol 8 (4) ◽  
pp. 12529-12534

Cloud computing frameworks are intended to help the availability and sending of different assistance situated applications by the clients. Distributed computing administrations are made accessible through the server firms or server farms. These assets are the real wellspring of the power utilization in server farms alongside cooling and cooling gear. In addition the vitality utilization in the cloud is corresponding to the asset usage and server farms are nearly the world's most noteworthy purchasers of power. The asset distribution issue in a nature of NP-complete, which requiring the improvement of heuristic systems to take care of the asset allotment issue in a distributed computing condition. The multifaceted nature of the asset distribution issue increments with the size of cloud framework and winds up hard to settle successfully. The exponential arrangement space for the asset designation issue can look through utilizing heuristic methods to acquire a problematic arrangement at the satisfactory time.


2016 ◽  
pp. 1053-1066 ◽  
Author(s):  
Nitin Nagar ◽  
Ugrasen Suman

Cloud computing is comprised of major demand from the every group of organization because of easy availability and cost effectiveness. The responsibilities of cloud service providers will become increasing more due to the great progression in every cloud computing deployment model (public, private and hybrid) and service models (SaaS, PaaS and IaaS). In this perspective, cloud computing faces multiple challenges, especially in cloud computing security at all levels (e.g., host, network, application and data levels). Authentication is the constantly the biggest concerned for IT industries to adopt cloud computing environment. The availability, performance, key logger attack, malicious insiders, outsider attacks and service disruptions explore (service hijacking) issues are the key research challenges in the cloud computing authentication level. In this aspect, traditional user name and password is not enough as a single factor (first factor). This paper has proposed a secure cloud computing framework which uses first factor as a crypt user name and password with the ATM pin as a second factor called M-pin. The proposed work focuses on a solution to the threats that are the major issues in the cloud adoption.


2013 ◽  
Vol 3 (1) ◽  
pp. 44-57 ◽  
Author(s):  
Veena Goswami ◽  
Choudhury Nishkanta Sahoo

Cloud computing has emerged as a new paradigm for accessing distributed computing resources such as infrastructure, hardware platform, and software applications on-demand over the internet as services. This paper presents an optimal resource management framework for multi-cloud computing environment. The authors model the behavior and performance of applications to integrate different service-providers for end-to-end-requirements. Each service model caters to specific type of requirements and there are already number of players with own customized products/services offered. Intercloud Federation and Service delegation models are part of Multi-Cloud environment where the broader target is to achieve infinite pool of resources. They propose an analytical queueing network model to improve the efficiency of the system. Numerical results indicate that the proposed provisioning technique detects changes in arrival pattern, resource demands that occur over time and allocates multiple virtualized IT resources accordingly to achieve application Quality of Service targets.


2013 ◽  
Vol 347-350 ◽  
pp. 3312-3316
Author(s):  
Hong Jun Chen ◽  
Xue Qin Wu

The positive factors of the cloud computing: the great commercial value, the cheap and convenient use, has been recognized widely. But there are many risks on security. These security risks will greatly restrict the development of cloud computing. Cloud security risks such as: the cloud platform is easily vulnerable, cloud resources is easily abused, the cloud platform data is accessed by unauthorized user or the data is missing, the violations in the network is difficult to trace and survey, and the service providers replacement will affect the migration of the users data and services. So we research the virtualization technology, data backup and disaster recovery technology, encryption technology of data storage and transmission, the authentication technology of service providers and users, risk assessment, and legal constraints and safety training. Our research is strived to obtain a secure cloud computing environment.


Sign in / Sign up

Export Citation Format

Share Document