{"title":"使用ICLoS算法的负载平衡和安全问题的云挑战","authors":"M. Buvaneswari, M. Loganathan, S. Sangeetha","doi":"10.1109/ICCCT2.2017.7972254","DOIUrl":null,"url":null,"abstract":"Cloud computing is an emerging technology in today's world. The services provided by the cloud is like freeware. Resources in cloud will be in shared pool. If any resources wanted in dynamic basis they are requested to shared pool and particular resources will be provided to users. Resources are will be in form of clusters. From these group cluster or master nodes are selected using Advanced Ant colony optimization algorithm. Here each node will be communicating using heart beat messages reporting their individual status to nearby node and master node. The application or data will be requested from the servers. Upon the requested services they will be provided in secure manner by DMZ(De-militarized zone) techniques. They provide three layer of security to the data requestition. They provide security to data leakage in 3 layers with various algorithm.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Cloud challenges of load balancing and security issues using ICLoS algorithm\",\"authors\":\"M. Buvaneswari, M. Loganathan, S. Sangeetha\",\"doi\":\"10.1109/ICCCT2.2017.7972254\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing is an emerging technology in today's world. The services provided by the cloud is like freeware. Resources in cloud will be in shared pool. If any resources wanted in dynamic basis they are requested to shared pool and particular resources will be provided to users. Resources are will be in form of clusters. From these group cluster or master nodes are selected using Advanced Ant colony optimization algorithm. Here each node will be communicating using heart beat messages reporting their individual status to nearby node and master node. The application or data will be requested from the servers. Upon the requested services they will be provided in secure manner by DMZ(De-militarized zone) techniques. They provide three layer of security to the data requestition. They provide security to data leakage in 3 layers with various algorithm.\",\"PeriodicalId\":445567,\"journal\":{\"name\":\"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)\",\"volume\":\"14 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCT2.2017.7972254\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCT2.2017.7972254","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cloud challenges of load balancing and security issues using ICLoS algorithm
Cloud computing is an emerging technology in today's world. The services provided by the cloud is like freeware. Resources in cloud will be in shared pool. If any resources wanted in dynamic basis they are requested to shared pool and particular resources will be provided to users. Resources are will be in form of clusters. From these group cluster or master nodes are selected using Advanced Ant colony optimization algorithm. Here each node will be communicating using heart beat messages reporting their individual status to nearby node and master node. The application or data will be requested from the servers. Upon the requested services they will be provided in secure manner by DMZ(De-militarized zone) techniques. They provide three layer of security to the data requestition. They provide security to data leakage in 3 layers with various algorithm.