Resource-Diversity Tolerant: Resource Allocation in the Cloud Infrastructure Services
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 5
Abstract
Abstract: The cloud offers data processing, data centers to process and preserve the transactional data of the clients. Dynamic capacity provisioning is promising approach for reducing energy consumption by dynamicallychanging number of progressive machines for contest resource condition .In processing the persistence management the data store is identified as more a power consuming process. We can reduce the power consumptions through on-demand allocation and activation of the machines as per the requests. Through there are many recent studies, but they cannot tolerate the variations in the available infrastructures and the requirements found in fabrications. Especially the fabrication systems (production data centers) all vm's may nothave same capabilities ,similarly all requests are not same in the amount of resource requirements, when the priorities by availability and the requirements are not properly managed , the delay in allocation is increased,idealness of the Vm's is increased and subsequently effects the power utilizations. We propose an efficient and dynamic resource allocation mechanism based on genetic algorithm, that exactly matches the resource requirements to the capacity inferred Vm's. This mechanism reduces the energy utilization and latency.This mechanism reduces the energy utilization, latency and also finds risks from attacker.
Authors and Affiliations
Mr. Surya Bahadur, , S. Ramachandra
Language Mobile Learning Design: The Tamazight Language
Even though Tamazight language in Morocco has been legitimate for eleven years and official for almost two years, its learning needs a huge effort to successfully make it in this enormous batch of existing unformat...
Secured Genetic Algorithm based image hiding technique with location number compression
Abstract: Data hiding involves hiding of information in a cover media to obtain the indistinguishable media, in such a way that the cover media is supposed not to have any embedded image for its unintended recipien...
Dissemination of Link State Information for Enhancing Security in Mobile Ad Hoc Networks
A mobile adhoc network is a Self-configuring network of mobile routers connected by wireless links. In the mobile adhoc network, each and every device moves independently in any direction so that there are frequent...
Design and Development of Secure Electronic Voting System Using Radio Frequency Identification and Enhanced Least Significant Bit Audio Steganographic Technique
Abstract: Electronic decision making process has been adjudged as an alternative measure to address the flaws of ballot voting system for the delivery of free, fair, confident, credible and transparent elections. Electro...
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with Computation Offload
Cloud computing is Modern day’s wonder. It is not a product but a service, which provides shared resources, software, and information to computers and other devices like smart phones as a utility over a net...