Comparative Analysis, Security Aspects & Optimization ofWorkload in Gfs Based Map Reduce Framework in Cloud System
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 1
Abstract
Abstract: This paper discusses a propose cloud infrastructure that combines On-Demand allocation ofresources with improved utilization, opportunistic provisioning of cycles from idle cloud nodes to otherprocesses It provides fault tolerance while running on inexpensive commodity hardware, and it delivers highaggregate performance to a large number of clients.Because for cloud computing to avail all the demandedservices to the cloud consumers is very difficult. It is a major issue to meet cloud consumer’s requirements.Hence On-Demand cloud infrastructure using map reduce configuration with improved CPU utilization andstorage utilization is proposed using Google File System by using Map-Reduce. Hence all cloud nodes whichremains idle are all in use and also improvement in security challenges and achieves load balancing and fastprocessing of large data in less amount of time. Here we compare the FTP and GFS for file uploading and filedownloading; and enhance the CPU utilization and storage utilization and fault tolerance,.Cloud computing moves the application software and databases to the large data centres, where themanagement of the data and services may not be fully trustworthy. Therefore this security problem is solve byencrypting the data using encryption/ decryption algorithm and Map-Reducing algorithm which solve theproblem of utilization of all idle cloud nodes for larger data.
Authors and Affiliations
Rahul U. Patil , Atul. U. Patil
Threats and Security using Trust Techniques in Wireless Sensor Networks
Abstract: Wireless Sensor Networks are implementing on large scale in real time environments due to its incredible uses in real life. Wireless Sensor Networks don’t need human interference for its working so theycan plac...
Information technology implementation for educationaldevelopment of rural India – A review
Abstract : India as a developing country is on its path of revolution in every aspect. But the poor economy andlow per capita income of families in India affects the quality of education. As India comprises 70% of...
Enhancement of Data Hiding Capacity in Audio Steganography
Nowadays, a lot of applications are Internet-based and demand of internet applications requires data to be transmitted in a secure manner. Data transmission in public communication system is not secure...
Passive Image Forensic Method to Detect Resampling Forgery inDigital Images
Abstract: The digital images are becoming important part in the field of information forensics and security,because of the popularity of image editing tools, digital images can be tampered in a very efficient mannerwitho...
Analysis of Iris Recognition Based On FAR and FRR Using Hough Transform
Abstract: Iris recognition is an identification method of biometric that uses pattern-recognition techniques. It is one of the most biometrical techniques used for personal identification. In this paper, we give a brief...