SURVEY ON EFFICIENT AND ENHANCED RESOURCE ALLOCATION FOR WORKFLOW IN CLOUD COMPUTING
Journal Title: Elysium Journal of Engineering Research and Management - Year 2016, Vol 4, Issue 6
Abstract
Cloud computing is delivery of services over internet that shares the resources on demand. Resources utility can be increased or decreased as per demand. Cloud computing offer users to pay only for what they use and work load they use. Cloud computing mainly reduces the cost by sharing the resources. Clouds are used in real time application like Google Email Communication, Google Docs, Microsoft Sky Drive and Amazon S3, Google Drop box. Cloud allows us to access on-demand applications and associated data from anywhere. There is no need to purchase storage resources, computational resources because all these features are provided by the cloud service provider, and also eliminates the need for IT mangers. Pay-as-you-go model charges the user who makes use of on-demand resources. Major drawback in cloud is optimizing the utilization of allocated resources. Resource sharing is the objective of minimizing the costs associated with it. Other drawbacks in cloud are sharing infrastructure based on user need, because it is so difficult to balance between resource allocation and on demand service. Nowadays highly confidential data like healthcare and military records are stored in cloud. There are many security issues while storing the data in clouds. Data are stored in third-party cloud service provider which user may not fully trust. So we propose an efficient attribute-based encryption method to encrypt the data and store it in cloud.
Authors and Affiliations
Dennis Ebenezer D, Siva Chandran
COMPARATIVE STUDY ON RESOURCE ALLOCATION METHODS IN CLOUD COMPUTING
Cloud Computing is a contribution-based service where you can procure networked storage space and computer resource. Resource allocation is the process of assigning and managing assets in a manner that su...
SURVEY ON NETWORK DEFENCE SYSTEM [NDS] FOR CRYPTOGRAPHY AND HYBRID NETWORK SECURITY SYSTEM
Many computing systems have recently and preventing hacking is important in protecting business. Many significant security methodologies have been proposed to provide security between hacking. Fortunate...
Brain Tumor Classification Using Machine Learning Algorithms
A brain tumor is a collection of tissue that is grouped by a gradual addition of anomalous cells and it is important to classify brain tumors from the magnetic resonance imaging (MRI) for treatment. Human investigation i...
GAIT ANALYSIS BY DIFFERENT TECHNIQUES
Gait analysis is used in clinical evaluation of musculoskeletal system, design and assessment of prosthesis (especially for lower limbs), in the process of rehabilitation after injury and in biometrics. This paper review...
SELECTION OF OPTIMAL MINING ALGORITHM FOR OUTLIER DETECTION - AN EFFICIENT METHOD TO PREDICT/DETECT MONEY LAUNDERING CRIME IN FINANCE INDUSTRY
Today, Money Laundering (ML) poses a serious threat and unique challenge to financial institutions. Most of the financial institutions internationally have been implementing Anti-Money Laundering solutions (AML) to fight...