Performance Enrichment in Multitenant Application for Clouds
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2014, Vol 2, Issue 4
Abstract
The ability to range a web application or website is tied directly to understanding where the resource constraints lie and what force the addition of various resources has on the Multi-Tenant applications. Unfortunately, the skeleton and architects more often than not assume that simply adding another server into the mix can fix any performance difficulty and security issues as well as data storage issues. When we start adding new hardware/update existing hardware in a private, public, Hybrid clouds, the complexity starts growing which affects recital and hence security. While priced cloud computing services save pains to maintain the computational environment, there are several drawbacks such as overhead of virtual machines, possibility to share one physical machine with several virtual machines, and indeterminacy of topological allocation of their own virtual machines. Multi-tenancy is one of key characteristics of the service oriented computing especially for Software as a Service (SaaS) to leverage economy of scale to drive down total cost of ownership for both service consumer and provider. This paper aims to study the technologies to build a cost-effective, protected and scalable multi-tenant infrastructure and how to improve the security and enhance its performance. This paper also identifies the potential performance bottlenecks, summarizes corresponding optimization approaches and best implementation practices for different multi-tenant business usage models
Authors and Affiliations
Ravinder Chauhan, Sukhwinder Kaur
Review on Deep Learning, Machine Learning and its Application
In contemporary computer sciences, machine learning is one of the areas. To make machines intelligent, a lot of study has been done. Learning is a fundamental aspect of both computer and human behavior. For the same prob...
A Review on Smart Home Using IoT
Mobile gadgets have become an integral part of our daily lives. The last several years As a result, providing facilities and services is essential. On the internet, security is becoming more important. Android mobile int...
Analyzing Various Machine Learning Algorithms for Blockchain-Based Fraud Detection
A blockchain network's economics and user confidence can be seriously harmed by fraud. Consensus algorithms like proof of work and proof of stake can verify the legitimacy of a transaction but not the identity of the peo...
Assessing the Performance of an Integrated Health Information Exchange System Using Unstructured Supplementary Service Data
As budding nations gradually adopt the use of IT services to store medical records, several healthcare facilities are still unable to exchange information because of limited access to high speed internet service and high...
Potential of Soil Stabilization Using Ground Granulated Blast-Furnace Slag (GGBS)
Natural delicate soil also known as organic soft soil (OSS) has extensive negative geotechnical properties, for example, high water content, low shear strength, high natural matter, and low bearing limit and thus a criti...