{"title":"Optimizing cloud service provider scheduling by using rough set model","authors":"Mehul Mahrishi, Aitha Nagaraju","doi":"10.1109/ICCCTAM.2012.6488103","DOIUrl":"https://doi.org/10.1109/ICCCTAM.2012.6488103","url":null,"abstract":"The applications submitted to cloud middle ware have been distributed to the CSPs based on the available CSPs in the cloud environment to categorize the service CSP providers with this work we are trying to introduce a concept to find the optimal csp based on rough set based approach. IaaS provides a large amount of computational capacities to users in a flexible and efficient way. In the market various CSPs are available example Amazons elastic computing cloud offers virtual machine with 0.1 us dollars per hour similarly another cloud Google compute cloud offers virtual machine with 0.5 us dollars per hour then the cloud users need rating among the various Csps. In this research work we have been proposing an approach to provide the rating of CSPs based on the internal performance of Datacenters and virtual machines. In present situation day-by- day number of cloud service providers have been increasing drastically. In this scenario existing service providers scheduling need a mechanism to find the optimal service providers information to Service request scheduling using this information SRS can allocate the service to the respective optimal service providers. In this paper we studied the problem of dynamic request allocation and scheduling for context aware application deployed in geographically distributed data centers forming a cloud.","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121154041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Suresh Varma, A. Satyanarayana, M. V. Rama Sundari
{"title":"Performance analysis of cloud computing using Queuing models","authors":"P. Suresh Varma, A. Satyanarayana, M. V. Rama Sundari","doi":"10.1109/ICCCTAM.2012.6488063","DOIUrl":"https://doi.org/10.1109/ICCCTAM.2012.6488063","url":null,"abstract":"Cloud computing is a new economic computing paradigm in which information and computer resources can be accessed from a Web browser by customers. The process of a job entering into the cloud schedule is generally in the form of queue, so that each user needs to wait until the earlier users are being served. Whenever a new job enters the cloud buffer, the queue length increases so the waiting time. There are many methods like FIFO, Priority scheduling, Round robin etc to dispatch the job from buffer to a machine. In this paper, we developed and analyzed a cloud and provided service using Queuing analogy. The transient analysis of cloud studied by deriving various parameters like mean queue length, Utilization, Throughput and Mean Waiting Time in the cloud. It is observed that using queuing theory in the service has tremendous influence on Mean Delay, Throughput and Congestion Control.","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121812658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic scheduling approach for data-intensive cloud environment","authors":"M. R. Islam, M. Habiba","doi":"10.1109/ICCCTAM.2012.6488094","DOIUrl":"https://doi.org/10.1109/ICCCTAM.2012.6488094","url":null,"abstract":"The scheduling problem domain in cloud environment recently has been extended to deal with two new phenomenon such as data-intensive and security constraints in cloud environment. However traditional scheduling approaches have been failed to deal with these new addition. In this paper, the system architecture along with security constraint model for data-intensive cloud environment is designed. Moreover, a novel security constraints scheduling approach to schedule all jobs in cloud environment efficiently without compromising required security level for each job is presented in this paper. In the regard of cloud security, swarm intelligence is highly capable to provide better solutions for such potentially intractable problems. Therefore, an Ant Colony Optimization based scheduling algorithm is proposed in this paper. Several meta-heuristic mathematical models as well as explanations have been introduced to deal with effective security constraint scheduling strategy. Meanwhile, the experimental results shows that the overall performance of proposed scheduling algorithm is better than other existing scheduling algorithms on four basic measurements: the optimization rate of throughput, cost, CPU time and security constraints.","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130955205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of distributed chess engine using PaaS","authors":"G. Badhrinathan, A. Agarwal, R. Anand Kumar","doi":"10.1109/ICCCTAM.2012.6488068","DOIUrl":"https://doi.org/10.1109/ICCCTAM.2012.6488068","url":null,"abstract":"The present day limitation on clock speed of the CPU makes it burdensome to efficiently execute algorithms that require high processing power. This paper brings to picture how distributed systems can be utilized to address such issues, which are limited by the hardware configurations of current-day physical systems. To illustrate the same, the Minimax algorithm is depicted here. The algorithm that we have implemented dynamically chooses the depth based on the current branching-factor.","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122360172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Shirzad, Mehdi Ahmadipour, Ali Hoseinpanah, Hojat Rahimi
{"title":"E-learning based on cloud computing","authors":"M. Shirzad, Mehdi Ahmadipour, Ali Hoseinpanah, Hojat Rahimi","doi":"10.1109/ICCCTAM.2012.6488101","DOIUrl":"https://doi.org/10.1109/ICCCTAM.2012.6488101","url":null,"abstract":"The popularity of learning of the internet, the construction of perfect web-based learning environment has become one of the hot points on researching remote education. Cloud computing is growing rapidly, with applications in almost any area, including education. E-learning systems usually require many hardware and software resources. There are many education institutions that cannot afford such investments, and cloud computing is the best solution. This paper presents the positive impact of using cloud computing architectures upon E-learning solutions development. If focuses on the benefits of cloud computing for e-learning solutions and the e-learning project management challenges when this architectures is used.","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125719760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modified BTG-RBAC model for SaaS","authors":"Rajesh K, Ashalatha Nayak","doi":"10.1109/ICCCTAM.2012.6488076","DOIUrl":"https://doi.org/10.1109/ICCCTAM.2012.6488076","url":null,"abstract":"Cloud computing is a request-response model that deliver the services over internet. Customer offers the benefit/payment to the service provider based on the resource usage called utility computing. The principal service models being deployed in cloud are Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). SaaS delivers software as a service, PaaS delivers computing platform as a service and IaaS delivers infrastructure as a service over the internet. Role Based Access Control (RBAC) is a variant of access control model, where user gains the access depending on the role chosen. Further some RBAC models like `Break The Glass' (BTG) approach allow the user to access the denied services with only two options access or deny. However in the proposed approach, access control status is enhanced to improve the flexibility and efficiency in RBAC without compromising on the security issue. The proposed model is implemented as client-server architecture by modifying BTG-RBAC Model.","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131148972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud computing security: Concerns, strategies and best practices","authors":"T. Francis, S. Vadivel","doi":"10.1109/ICCCTAM.2012.6488099","DOIUrl":"https://doi.org/10.1109/ICCCTAM.2012.6488099","url":null,"abstract":"Cloud computing is a technology that gives a convenient and on-demand access to the different services through a shared pool of configurable computing resources. This technology raises concerns about the movement of data and control into a third party's control sphere. In this paper cloud security concerns and security requirements are addressed. Hypothetical cloud architecture and best practices for cloud security are proposed.","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"100 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131520950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards an Efficient and Secure Educational Platform on cloud infrastructure","authors":"S. Brohi, M. Bamiah, S. Chuprat, J. Manan","doi":"10.1109/ICCCTAM.2012.6488088","DOIUrl":"https://doi.org/10.1109/ICCCTAM.2012.6488088","url":null,"abstract":"Existing educational platforms are highly cost-consuming and inefficient in-terms of scalability, flexibility of infrastructures, availability, recovery, accessibility and security. Cloud computing is considered as a flexible business and technological model for providing an Efficient Educational Platform (EEP) due to its significant features. However, an EEP is not a complete solution required by Educational Organizations (EOs), they require Efficient as well as Secure Educational Platform (ESEP). Since cloud computing is an open access global technology, there are several security threats that might take place from malicious users. EOs are reluctant to trust and adopt this paradigm because of threats that can compromise the security of their confidential data. In this research paper, we describe the ICT related challenges faced by educational platforms and we emphasize the significance of cloud computing in enabling an EEP, finally we propose a conceptual model for developing an ESEP. Our contribution consists of several security tools and techniques such as Trusted Virtual Domains (TVDs), Security as a Service (SECaaS), Intrusion Detection Tools, Trusted Platform Module (TPM), virtual TPM (vTPM).","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114603324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing and deploying a Hospital Management Application in Google cloud and performance study of the application","authors":"Siva Manaswini Malladi, S. Vadivel","doi":"10.1109/ICCCTAM.2012.6488069","DOIUrl":"https://doi.org/10.1109/ICCCTAM.2012.6488069","url":null,"abstract":"Web Services are internet enabled software components. By composing web services we can provide integration of Enterprise applications. Web Services are being used extensively by many enterprises like IBM, Microsoft and oracle every day. SOAP and REST are very popular types of web services. A Hospital Management Application is implemented as a web service that can perform functions like online appointment booking, preparing a prescription online, online room reservation, storing patient's medical history etc. The login forms of this application are made secured by computing the digest of the login details. The application is designed and developed using Eclipse, Google SQL cloud and Google App Engine. The application designed and developed is deployed to the Google App Engine to make it available online and to facilitate online transactions via the internet. The scalability test of the cloud enabled hospital management system has also been done using a custom developed software tool.","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"16 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114108587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An adaptive Qos-aware cloud","authors":"Zhang Yuchao, Deng Bo, Peng Fuyang","doi":"10.1109/ICCCTAM.2012.6488091","DOIUrl":"https://doi.org/10.1109/ICCCTAM.2012.6488091","url":null,"abstract":"As an emerging technique, cloud computing has been suffering challenges from its quality of service (QoS) guarantee. Any violation of SLA would lead to a loss for both cloud providers and customers. To solve this problem, dynamical management of resources to ensure the QoS has been put forward as a demanding work in the cloud. In this paper, we present an adaptive QoS-aware cloud based on the Eucalyptus, which can dynamically scale up and down to guarantee QoS negotiated via SLA. Our adaptive QoS-aware cloud employs two load balancing policies and monitors the application-level QoS to scale adaptively. We conduct the evaluation in open source Eucalyptus based on XEN virtual machine monitor (VMM). As demonstrated in our experiment, our solution presents an adaptive scalability while maintaining the QoS.","PeriodicalId":111485,"journal":{"name":"2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128167715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}