Wahid Hussain, R. M. Liaqat, N. Saqib, Kyong-Ho Kim
{"title":"云计算中基于安全代理的资源分配体系结构","authors":"Wahid Hussain, R. M. Liaqat, N. Saqib, Kyong-Ho Kim","doi":"10.1109/ICITCS.2016.7740307","DOIUrl":null,"url":null,"abstract":"Resource allocation is most challenging task in cloud computing where the service providers seeks to find an effective and efficient resource allocation that meets all demands of users as well as sustain the quality of service. In this paper we have proposed an agent based architecture for resource allocation in dynamic environment by defining the roles at each level. Proposed architecture has the various strategies related to resource allocation such reliability, performance, scalability as well as security related issues in distributed environment. This paper also describe the various proposed architecture by researcher and their limitations. Proposed architecture overcome the all limitation previously proposed by researchers.","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Secure Agent Based Architecture for Resource Allocation in Cloud Computing\",\"authors\":\"Wahid Hussain, R. M. Liaqat, N. Saqib, Kyong-Ho Kim\",\"doi\":\"10.1109/ICITCS.2016.7740307\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Resource allocation is most challenging task in cloud computing where the service providers seeks to find an effective and efficient resource allocation that meets all demands of users as well as sustain the quality of service. In this paper we have proposed an agent based architecture for resource allocation in dynamic environment by defining the roles at each level. Proposed architecture has the various strategies related to resource allocation such reliability, performance, scalability as well as security related issues in distributed environment. This paper also describe the various proposed architecture by researcher and their limitations. Proposed architecture overcome the all limitation previously proposed by researchers.\",\"PeriodicalId\":239663,\"journal\":{\"name\":\"International Conference on IT Convergence and Security\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on IT Convergence and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICITCS.2016.7740307\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on IT Convergence and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITCS.2016.7740307","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Secure Agent Based Architecture for Resource Allocation in Cloud Computing
Resource allocation is most challenging task in cloud computing where the service providers seeks to find an effective and efficient resource allocation that meets all demands of users as well as sustain the quality of service. In this paper we have proposed an agent based architecture for resource allocation in dynamic environment by defining the roles at each level. Proposed architecture has the various strategies related to resource allocation such reliability, performance, scalability as well as security related issues in distributed environment. This paper also describe the various proposed architecture by researcher and their limitations. Proposed architecture overcome the all limitation previously proposed by researchers.