Cloud Virtualization Technique Using CloudSim plus Platform
-
https://doi.org/10.14419/ijet.v7i3.29.21399 -
cloud computing, Resource Provisioning, Cloud security, Energy aware resource -
Abstract
A candid remark of cloud computing is that it is a web based totally computing that Consists of good sized corporations of remotely positioned servers which are networked to allow the centralized storage and on line access to computer services and resources. It has emerged as the distinguished driver for dispensed and shared computing. It is embraced via researchers, practitioners and service vendors throughout all industries round the globe Clouds usually focal point to maximize the effectiveness of shared sources which are no longer solely pooled and shared via a couple of tenants but can be dynamically reallocated as per demand the Resource Allocation Strategy, coupled with electricity conscious data centres is all about amalgamating numerous cloud provider company things to do for allocating scarce sources effectively inside the limit of cloud environment so as to meet the growing demands of the cloud customers and with the aim to reduce the power consumption in massive cloud records centres This paper offers an overview of one-of-a-kind simulation environments and distinctive methodologies applied for cloud computing environment.
Â
Â
-
References
[1] Harjit Singh, AkaliPhoola Singh, “Current Trends in Cloud Computing a Survey of Cloud Computing Systemsâ€, International Journal of Electronics and Computer Science Engineering, Volume1, 2010
[2] Rabi Prasad PadhyManasRanjanPatra Suresh Chandra Satapathy “cloud computing security issues and research challenges†IRACST - International Journal of Computer Science and Information Technology &Security (IJCSITS)Vol. 1, No. 2, December 2011.
[3] JayadipSen Innovation Labs, “Security and privacy issues in cloud computingâ€.
[4] HubhashisSengupta, Vikrant Kaulgud, VibhuSaujanya Sharma “Cloud Computing Security - Trends and Research Directions 2011 IEEE World Congress on Services.
[5] S. ThamaraiSelvi, C. Valliyammai and V. NeelayaDhatchayani “Resource Allocation Issues and Challenges in Cloud Computing 2014 International Conference on Recent Trends in Information Technology.
[6] TunishaSaxenaVaishaliChourey “A Survey Paper on Cloud Security Issues and Challenges “78-1-4799-3064-7/14/$31.00©20 14 IEEE.
[7] Mohammad UbaidullahBokhari, QahtanMakkiShallal, YahyaKordTamandani†Security and privacy issues in cloud computing†2016 International Conference on Computing for Sustainable Global Development (INDIACom).
[8] WgCdrNimitKaura Lt Col AbhishekLal “Survey paper on cloud computing securityâ€, 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS).
[9] R. KannigaDeviS.Sujan,†A survey on application of CloudSim toolkit in cloud computing†International journal of innovative research in science engineering and technology, An ISO 3297: 2007 Certified Organization) Vol. 3, Issue 6, June 2014.
[10] Sultan Aldossar, William Allen,†Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutionsâ€. (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 7, No. 4, 2016.
[11] PapriGhosh,Vishal Thakur, Dr. PravinBhathawala,†Data Security and Privacy in Cloud Computing Using Different Encryption Algorithmsâ€, International Journal of Advanced Research in Computer Science and Software Engineering 7(5), May- 2017, pp. 469-471.
-
Downloads
-
How to Cite
Nida Kousar, G., Kumar K L, S., & Majumdar, J. (2018). Cloud Virtualization Technique Using CloudSim plus Platform. International Journal of Engineering & Technology, 7(3.29), 660-662. https://doi.org/10.14419/ijet.v7i3.29.21399Received date: 2018-10-09
Accepted date: 2018-10-09