Cloud hosting services and resources utilizing efficient proxy server based speculative algorithm
-
2018-09-26 https://doi.org/10.14419/ijet.v7i4.14135 -
Cloud Computing, Efficient Proxy Server Based Speculative (EPSBS) Algorithm, Quality of Services (QOS), Cloud Service Provider, Execution Time, Energy Consumption, Hosting Service Size, Throughput. -
Abstract
Cloud computing is an envisioned technique for service providing paradigm. Currently, many enterprises and organizations are hosting data into cloud service provider to minimize the maintenance cost, energy consumption and improve the data consistency. However, the several cloud servers facing the various hosting service policies, clients may be confused with which cloud server providers are appropriate for storing data and which hosting methodology is inexpensive. The current status quo is clients frequently put data into the single cloud and simply trust to luck. In the paper, proposes a new data hosting redundancy methodology called as Efficient Proxy Server Based Speculative (EPSBS) algorithm that provides accessibility guarantee, reducing hosting service, energy consumption and enhances Quality of Services (QoS) performance concurrently and it requires integrating two key functions. The first function is choosing numerous appropriate cloud service providers and a suitable EPSBS redundancy methodology to store data with guaranteed accessibility. The second key function is triggering a transmission process to reallocate data along with the deviations of data access prototype of clouds. Based on Experimental evaluations, proposed methodology reduces 0.11 ET (Execution Time), and 0.02 EC (Energy Consumption) and improves 29% HS (Hosting Service size), 2.8 T (Throughput) compared than existing methodologies.
-
References
[1] Li, Z. H., Liu, G., Ji, Z. Y., & Zimmermann, R., “Towards cost-effective cloud downloading with tencent big dataâ€, Journal of Computer Science and Technology, Vol. 30, No. 6, pp. 1163-1174, 2015.https://doi.org/10.1007/s11390-015-1591-5.
[2] Schnjakin, M., Metzke, T., &Meinel, C., “Applying erasure codes for fault tolerance in cloud-raidâ€, In Computational Science and Engineering (CSE), 2013 IEEE 16th International Conference on IEEE, pp. 66-75, 2013.
[3] Ali, M., Malik, S., & Khan, S., “DaSCE: Data security for cloud environment with semi-trusted third partyâ€, IEEE Transactions on Cloud Computing, 2015.
[4] Li, Z., Zhang, Z. L., & Dai, Y., “Coarse-grained cloud synchronization mechanism design may lead to severe traffic overuseâ€, Tsinghua Science and Technology, Vol. 18, No. 3, pp. 286-297, 2013.https://doi.org/10.1109/TST.2013.6522587.
[5] Karthikeyan, T., &Nandhini, T., “Dependent component cost model of legacy application for hybrid cloudâ€, In Circuit, Power and Computing Technologies (ICCPCT), 2016 International Conference on IEEE, pp. 1-5, 2016.
[6] Hansen, C., & Archibald, J., “The Case for RAID 4: Cloud-RAID Integration with Local Storageâ€, In Availability, Reliability and Security (ARES), 2016 11th International Conference on IEEE, pp. 235-240, 2016.
[7] Ranjan, A. K., Kumar, V., & Hussain, M., “Security Analysis of Cloud Storage with Access Control and File Assured Deletion (FADE)â€, In Advances in Computing and Communication Engineering (ICACCE), 2015 Second International Conference on IEEE, pp. 453-458, 2015.
[8] Graupner, H., Torkura, K., Berger, P., Meinel, C., &Schnjakin, M., “Secure access control for multi-cloud resourcesâ€, In Local Computer Networks Conference Workshops (LCN Workshops), 2015 IEEE 40th IEEE, pp. 722-729, 2015.
[9] Awad, A., Matthews, A., Qiao, Y., & Lee, B., “Chaotic Searchable Encryption for Mobile Cloud Storageâ€, IEEE Transactions on Cloud Computing, 2015.
[10] LD, D. B., & Krishna, P. V., “Honeybee behavior inspired load balancing of tasks in cloud computing environmentsâ€, Applied Soft Computing, Vol. 13, No. 5, pp. 2292-2303, 2013.https://doi.org/10.1016/j.asoc.2013.01.025.
-
Downloads
-
How to Cite
Mahadevan, R., & Anbazhagan, N. (2018). Cloud hosting services and resources utilizing efficient proxy server based speculative algorithm. International Journal of Engineering & Technology, 7(4), 2687-2691. https://doi.org/10.14419/ijet.v7i4.14135Received date: 2018-06-15
Accepted date: 2018-08-22
Published date: 2018-09-26