Data Possession Using Shipment Equilibrium Model And Mechanism on Multi cloud Environment
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 10
Abstract
Shipment equilibrium mechanism is the main building blocks for cloud computing applications which is based on the Map Reduce programming concept. Shipment equilibrium is essential for efficient operations in distributed environments. As Cloud Computing is growing rapidly and clients are demanding more services and better results, shipment equilibrium for the Cloud has become a very interesting and important research area. Many algorithms were suggested for assigning the client's requests to avail Cloud nodes. However, in a cloud computing environment, failure is the norm, and nodes may be upgraded, replaced, and added in the system. Files can also be dynamically created, deleted, and appended. This results in load imbalance, that is, the file chunks are not distributed as uniformly as possible in the nodes.
Authors and Affiliations
V Saibhanu, P Bhargava
Providing Security and Minimizing Data Management Cost in the Cloud
Cloud Computing Providing Efficient Services for Users and Organizations. To outsource their data to cloud servers. But main problem is users are worrying about the leakage or damage of the data. in order to overcome...
A Hybrid Approach to Detect and Recognize Texts in Images
Text data present in images serves important information which is helpful for different applications. Locating text in case of variation in style, color, as well as complex image background makes text reading from imag...
A Survey on Distributed Network Services Using SSO for Secure Mechanism
Methodologies presently use in single sign-on (SSO) for enable a legal user with a single credential to be authenticated by a multiple service providers in a distributed computer network. The earlier techniques cause...
A method to predict the offloading potential for DTN and WIFI hotspots
An enormous amount of cellular data traffic has been produced by mobile users which exceeds the capacity of cellular network and hence weaken the network quality. The solution is to enhance the capacity of cellular n...
Encryption EXIF Metadata for Protection Photographic Image of Copyright Piracy
Many photographic images that are published to particular interests. This makes it more and more copyright piracy of images. In this study will make a tools and methods that can be used to protect the copyright of th...