Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Saravanan, S.
- Dynamic Sharing of Resources with Optimization in Mutual Cloud Computing Platform Effectively
Abstract Views :198 |
PDF Views:2
Authors
Affiliations
1 Computer Science and Engineering, M. Kumarasamy College of Engg-Karur, Tamilnadu, IN
1 Computer Science and Engineering, M. Kumarasamy College of Engg-Karur, Tamilnadu, IN
Source
International Journal of Emerging Trends in Science & Technology, Vol 2, No 1 (2016), Pagination: 7-11Abstract
Distributed computing has turned into a well known registering these days yet at the same time there is a some issues identified with trust in information. In huge scale computational cloud, enormous heterogeneous assets is urgent to accomplishing adaptable execution. In past examination endeavors, basically joining the two frameworks asset and notoriety administration techniques are not productive or powerful. Eventhough selecting the most astounding rumored hubs, there is tremendous disappointment in the framework in Qos requests. In this paper we propose shared distributed computing MCC stage, which join asset administration and notoriety administration in a symphonious way. Three key focuses in amicability : various asset/notoriety administration, multi quality asset choice, and sensible value asset/notoriety control. The exploratory results additionally says that Harmony idea give high versatility, load parity amid dispersion, mindfulness on area, and dynamism-strength in the huge scale and element MCC environment. Utilizing dynamic planning calculation assets are schedulded. The paper exhibits the plan, new elite with great trust for information.Keywords
Heterogeneous Resources, Resource Management, Reputation Management, High Performance, Trust.- A Safe Mechanism for Handling Data in Free Cloud
Abstract Views :276 |
PDF Views:7
Authors
S. Saravanan
1,
P. Santhi
1
Affiliations
1 Department of Computer Science and Engineering, M. Kumarasamy College of Engineering, Karur, Tamil Nadu, IN
1 Department of Computer Science and Engineering, M. Kumarasamy College of Engineering, Karur, Tamil Nadu, IN
Source
International Journal of Emerging Trends in Science & Technology, Vol 3, No 2 (2017), Pagination: 34-38Abstract
In this genuine those distributed computing, require make a cloud sensibly be normal enter for offering enrolling resources. On the off chance that it require disseminating enrolling organization insignificantly over Hosting neighbourhood servers or individual units ought to control applications, there would extreme protection nerves to administration data. The present structure requires help developed with cruel security arranges yet it require precisely issues. Those considerations are equivalent discrete duty, certifiable data possession, outcast Inspecting are secure regardless it require precisely issues. With give enough security straight forwardly cloud A little examine need been settled on around past flawless we suggest another structure recognized Likewise uniqueness constructed data dealing with and data checking transparently cloud which accomplishments those welfares for quantum instruments ought to asylum open database. We took a part reference in which cruel open cloud server, director Furthermore client would given with secure relationship with our expected piece of information which use optional Prophet display. Our honest to goodness taking in need both achievement what is more dissatisfaction rates with isolated also typical Clouds separately. Various customers might need to accumulate their larger part of the information on typical cloud servers along the side with those quick improvement about cloud enrolling. New wellbeing issue must make decided so as on sponsorship All the more customers change their data secured close by consistent cloud.Keywords
Distributed Computing, Open Cloud Server, Server.References
- Z. Fu, X. Sun, Q. Liu, L. Zhou, and J. Shu, “Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing,” IEICE Transactions on Communications, vol. E98-B, no. 1, pp.190-200, 2015.
- Y. Ren, J. Shen, J. Wang, J. Han, and S. Lee, “Mutual verifiable provable data auditing in public cloud database,” Journal of Internet Technology, vol. 16, no. 2, pp. 317-323, 2015.
- E. Kirshanova, “Proxy re-encryption from lattices,” PKC 2014, LNCS 8383, pp. 77-94, 2014.
- H. Guo, Z. Zhang, and J. Zhang, “Proxy re-encryption with unforgeable re-encryption keys,” Cryptology and Network Security, LNCS 8813, pp. 20-33, 2014.
- P. Xu, H. Chen, D. Zou, and H. Jin, “Fine-grained and heterogeneous proxy re-encryption for secure cloud storage,” Chinese Science Bulletin, vol. 59, no. 32, pp. 4201-4209, 2014.
- E. Esiner, A. Kupcu, and O Ozkasap, “Analysis and optimization on FlexDPDP: A practical solution for dynamic provable data possession,” Intelligent Cloud Computing, LNCS 8993, pp. 65-83, 2014.
- H. Wang, “Identity-based distributed provable data possession in multicloud database,” IEEE Transactions on Services Computing, vol. 8, no. 2, pp. 328-340, 2015.
- H. Wang, “Anonymous multi-receiver remote data retrieval for pay-tv in public clouds,” IET Information Security, vol. 9, no. 2, pp. 108-118, 2015.
- Q. Zheng, and S. Xu, “Fair and dynamic proofs of retrievability,” CODASPY’11, pp. 237-248, 2011.
- S. Saravanan, and I. Arivarasan, “An efficient ranked keyword search for effective utilization of outsourced cloud data,” Journal of Global Research in Computer Science, vol. 4, no. 4, pp. 8-12, 2014.
- S. Saravanan, and V. Venkatachalam, “Improving map reduce task scheduling and micro-partitioning mechanism for mobile cloud multimedia services,” International Journal of Advanced Intelligence Paradigms, vol. 8, no. 2, pp. 157-167, 2016.
- S. Saravanan, and V. Venkatachalam, “Advance map reduce task scheduling algorithm using mobile cloud multimedia services architecture,” IEEE Digital Explore, pp. 21-25, 2014.
- S. Swathi, “Preemptive virtual machine scheduling using CLOUDSIM tool,” International Journal of Advances in Engineering, vol. 1, no. 3, pp. 323-327, 2015.
- S. Saravanan, V. Venkatachalam, and S. T. Malligai, “Optimization of SLA violation in cloud computing using artificial bee colony,” International Journal of Advances in Engineering, vol. 1, no. 3, pp. 410-414, 2015.
- S. Thilagamani, and N. Shanthi, “Literature survey on enhancing cluster quality,” International Journal on Computer Science and Engineering, vol. 2, no. 6, pp. 1999-2002, 2010.
- T. Mekala, and R. Vikram, “Improve the efficiency of physical resources utilization on cloud computing by classifying virtualization strategy,” International Journal of Emerging Technology & Research.
- P. Sudhakar, and B. P. Devi, “A Survey on TaaS & SECaaS in cloud environment,” Journal of Advances in Chemistry, vol. 12, no. 15, pp. 4795-4798, 2016.
- B. P. Devi, S. Chitra, and B. Madhusudhanan, “Improving security in portable medical devices and mobile health care system using trust,” Journal of Medical Imaging and Health Informatics, vol. 6, no. 8, pp. 1955-1960, 2016.