Advances in Data Mining and Database Management - Advancing Cloud Database Systems and Capacity Planning With Dynamic Applications
Latest Publications


TOTAL DOCUMENTS

15
(FIVE YEARS 0)

H-INDEX

2
(FIVE YEARS 0)

Published By IGI Global

9781522520139, 9781522520146

Author(s):  
Marcus Tanque

In recent decades, vendors developed technology infrastructure solutions to integrate with enterprises and consumers' mobile devices. Hybrid development platforms are solution architecture designed to enhance developers' capabilities and provide organizations as well as customers the level of services to support mobile devices capabilities. Hybrid development platform solutions are easy to deploy at various enterprises. These capabilities can be distributed to/or integrated with mobile devices as agile applications and system interfaces. Hybrid mobile devices are designed to further provide users with enhanced technology solutions: cloud computing, big data, the Internet, physical and/or virtual network systems. The development of hybrid mobile platforms provides developers with advanced technology capabilities, necessary for supporting mobile devices once deployed to the marketplace. Technical and security features affecting the development and security of mobile devices are also discussed in this chapter.


Author(s):  
Sathiyamoorthi V.

It is generally observed throughout the world that in the last two decades, while the average speed of computers has almost doubled in a span of around eighteen months, the average speed of the network has doubled merely in a span of just eight months! In order to improve the performance, more and more researchers are focusing their research in the field of computers and its related technologies. Internet is one such technology that plays a major role in simplifying the information sharing and retrieval. World Wide Web (WWW) is one such service provided by the Internet. It acts as a medium for sharing of information. As a result, millions of applications run on the Internet and cause increased network traffic and put a great demand on the available network infrastructure.


Author(s):  
Suvendu Chandan Nayak ◽  
Sasmita Parida ◽  
Chitaranjan Tripathy ◽  
Prasant Kumar Pattnaik

The basic concept of cloud computing is based on “Pay per Use”. The user can use the remote resources on demand for computing on payment basis. The on-demand resources of the user are provided according to a Service Level Agreement (SLA). In real time, the tasks are associated with a time constraint for which they are called deadline based tasks. The huge number of deadline based task coming to a cloud datacenter should be scheduled. The scheduling of this task with an efficient algorithm provides better resource utilization without violating SLA. In this chapter, we discussed the backfilling algorithm and its different types. Moreover, the backfilling algorithm was proposed for scheduling tasks in parallel. Whenever the application environment is changed the performance of the backfilling algorithm is changed. The chapter aims implementation of different types of backfilling algorithms. Finally, the reader can be able to get some idea about the different backfilling scheduling algorithms that are used for scheduling deadline based task in cloud computing environment at the end.


Author(s):  
Rashmi Rai ◽  
G. Sahoo

The ever-rising demand for computing services and the humongous amount of data generated everyday has led to the mushrooming of power craving data centers across the globe. These large-scale data centers consume huge amount of power and emit considerable amount of CO2.There have been significant work towards reducing energy consumption and carbon footprints using several heuristics for dynamic virtual machine consolidation problem. Here we have tried to solve this problem a bit differently by making use of utility functions, which are widely used in economic modeling for representing user preferences. Our approach also uses Meta heuristic genetic algorithm and the fitness is evaluated with the utility function to consolidate virtual machine migration within cloud environment. The initial results as compared with existing state of art shows marginal but significant improvement in energy consumption as well as overall SLA violations.


Author(s):  
Marcus Tanque

Cloud computing consists of three fundamental service models: infrastructure-as-a-service, platform-as-a service and software-as-a-service. The technology “cloud computing” comprises four deployment models: public cloud, private cloud, hybrid cloud and community cloud. This chapter describes the six cloud service and deployment models, the association each of these services and models have with physical/virtual networks. Cloud service models are designed to power storage platforms, infrastructure solutions, provisioning and virtualization. Cloud computing services are developed to support shared network resources, provisioned between physical and virtual networks. These solutions are offered to organizations and consumers as utilities, to support dynamic, static, network and database provisioning processes. Vendors offer these resources to support day-to-day resource provisioning amid physical and virtual machines.


Author(s):  
Balamurugan Balusamy ◽  
Nadhiya S ◽  
Sumalatha N ◽  
Malathi Velu

In earlier days, people ran their applications or programs on a physical computer or a server. Cloud computing is a kind of Internet-based computing, where shared resources, data and information are provided to computers and other devices on-demand. Many business organizations were moving towards cloud because it provides flexibility, disaster recovery, security, collaboration etc., Relational Databases ruled the IT Industries for almost 40 years. Limitations of relational database lead to the rise of cloud database. A cloud database is a database that typically runs on a cloud computing platform. Cloud databases are on the rise as more and more businesses look to capitalize on the advantages of cloud computing to power their business applications. Cloud databases are mainly used in data mining, data warehousing and business intelligence. This chapter deals with different types of cloud database and how database influence capacity planning.


Author(s):  
Raghvendra Kumar ◽  
Prasant Kumar Pattnaik ◽  
Priyanka Pandey

Large companies have different methods of doing this, one of which is to run sales simulations. Such simulation systems often need to perform complex calculations over large amounts of data, which in turn requires efficient models and algorithms. This chapter intends to evaluate whether it is possible to optimize and extend an existing sales system called PCT, which is currently suffering from unacceptably high running times in its simulation process. This is done through analysis of the current implementation, followed by optimization of its models and development of efficient algorithms. The performances of these optimized and extended models are compared to the existing one in order to evaluate their improvement. The conclusion of this chapter is that the simulation process in PCT can indeed be optimized and extended. The optimized models serve as a proof of concept, which shows that results identical to the original system's can be calculated within < 1% of the original running time for the largest customers.


Author(s):  
Atefeh Khosravi ◽  
Rajkumar Buyya

Cloud computing provides on-demand access to computing resources for users across the world. It offers services on a pay-as-you-go model through data center sites that are scattered across diverse geographies. However, cloud data centers consume huge amount of electricity and leave high amount of carbon footprint in the ecosystem. This makes data centers responsible for 2% of the global CO2 emission. Therefore, having energy and carbon-efficient techniques for resource management in distributed cloud data centers is inevitable. This chapter presents a taxonomy and classifies the existing research works based on their target system, objective, and the technique they use for resource management in achieving a green cloud computing environment. Finally, it discusses how each work addresses the issue of energy and carbon-efficiency and also provides an insight into future directions.


Author(s):  
Sathiyamoorthi V

It is generally observed throughout the world that in the last two decades, while the average speed of computers has almost doubled in a span of around eighteen months, the average speed of the network has doubled merely in a span of just eight months! In order to improve the performance, more and more researchers are focusing their research in the field of computers and its related technologies. Data Mining is also known as knowledge discovery in database (KDD) is one such research area. The discovered knowledge can be applied in various application areas such as marketing, fraud detection, customer retention and production control and marketing to improve their business. It discovers implicit, previously unknown and potentially useful information out of datasets. Recent trends in data mining include web mining where it discovers knowledge from web based information to improve the page layout, structure and its content thereby it reduces the user latency in accessing the web page and website performance.


Author(s):  
Thangavel M. ◽  
Nithya S ◽  
Sindhuja R

Cloud computing is the fastest growing technology in today's world. Cloud services provide pay as go models on capacity or usage. For providing better cloud services, capacity planning is very important. Proper capacity planning will maximize efficiency and on the other side proper control over the resources will help to overcome from attacks. As the technology develops in one side, threats and vulnerabilities to security also increases on the other side. A complete analysis of Denial of Service (DOS) attacks in cloud computing and how are they done in the cloud environment and the impact of reduced capacity in cloud causes greater significance. Among all the cloud computing attacks, DOS is a major threat to the cloud environment. In this book chapter, we are going to discuss DOS attack in the cloud and its types, what are the tools used to perform DOS attack and how they are detected and prevented. Finally it deals with the measures to protect the cloud services from DOS attack and also penetration testing for DOS attack.


Sign in / Sign up

Export Citation Format

Share Document