Cloud hosting services and resources utilizing efficient proxy server based speculative algorithm

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Cloud computing is an envisioned technique for service providing paradigm. Currently, many enterprises and organizations are hosting data into cloud service provider to minimize the maintenance cost, energy consumption and improve the data consistency. However, the several cloud servers facing the various hosting service policies, clients may be confused with which cloud server providers are appropriate for storing data and which hosting methodology is inexpensive. The current status quo is clients frequently put data into the single cloud and simply trust to luck. In the paper, proposes a new data hosting redundancy methodology called as Efficient Proxy Server Based Speculative (EPSBS) algorithm that provides accessibility guarantee, reducing hosting service, energy consumption and enhances Quality of Services (QoS) performance concurrently and it requires integrating two key functions. The first function is choosing numerous appropriate cloud service providers and a suitable EPSBS redundancy methodology to store data with guaranteed accessibility. The second key function is triggering a transmission process to reallocate data along with the deviations of data access prototype of clouds.  Based on Experimental evaluations, proposed methodology reduces 0.11 ET (Execution Time), and 0.02 EC (Energy Consumption) and improves 29% HS (Hosting Service size), 2.8 T (Throughput) compared than existing methodologies.


  • Keywords


    Cloud Computing; Efficient Proxy Server Based Speculative (EPSBS) Algorithm; Quality of Services (QOS); Cloud Service Provider; Execution Time; Energy Consumption; Hosting Service Size; Throughput.

  • References


      [1] Li, Z. H., Liu, G., Ji, Z. Y., & Zimmermann, R., “Towards cost-effective cloud downloading with tencent big data”, Journal of Computer Science and Technology, Vol. 30, No. 6, pp. 1163-1174, 2015.https://doi.org/10.1007/s11390-015-1591-5.

      [2] Schnjakin, M., Metzke, T., &Meinel, C., “Applying erasure codes for fault tolerance in cloud-raid”, In Computational Science and Engineering (CSE), 2013 IEEE 16th International Conference on IEEE, pp. 66-75, 2013.

      [3] Ali, M., Malik, S., & Khan, S., “DaSCE: Data security for cloud environment with semi-trusted third party”, IEEE Transactions on Cloud Computing, 2015.

      [4] Li, Z., Zhang, Z. L., & Dai, Y., “Coarse-grained cloud synchronization mechanism design may lead to severe traffic overuse”, Tsinghua Science and Technology, Vol. 18, No. 3, pp. 286-297, 2013.https://doi.org/10.1109/TST.2013.6522587.

      [5] Karthikeyan, T., &Nandhini, T., “Dependent component cost model of legacy application for hybrid cloud”, In Circuit, Power and Computing Technologies (ICCPCT), 2016 International Conference on IEEE, pp. 1-5, 2016.

      [6] Hansen, C., & Archibald, J., “The Case for RAID 4: Cloud-RAID Integration with Local Storage”, In Availability, Reliability and Security (ARES), 2016 11th International Conference on IEEE, pp. 235-240, 2016.

      [7] Ranjan, A. K., Kumar, V., & Hussain, M., “Security Analysis of Cloud Storage with Access Control and File Assured Deletion (FADE)”, In Advances in Computing and Communication Engineering (ICACCE), 2015 Second International Conference on IEEE, pp. 453-458, 2015.

      [8] Graupner, H., Torkura, K., Berger, P., Meinel, C., &Schnjakin, M., “Secure access control for multi-cloud resources”, In Local Computer Networks Conference Workshops (LCN Workshops), 2015 IEEE 40th IEEE, pp. 722-729, 2015.

      [9] Awad, A., Matthews, A., Qiao, Y., & Lee, B., “Chaotic Searchable Encryption for Mobile Cloud Storage”, IEEE Transactions on Cloud Computing, 2015.

      [10] LD, D. B., & Krishna, P. V., “Honeybee behavior inspired load balancing of tasks in cloud computing environments”, Applied Soft Computing, Vol. 13, No. 5, pp. 2292-2303, 2013.https://doi.org/10.1016/j.asoc.2013.01.025.


 

View

Download

Article ID: 14135
 
DOI: 10.14419/ijet.v7i4.14135




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.