CFP last date
20 January 2025
Reseach Article

Capacity Management for Virtualized Data Centers using ECIES and Scheduling

by Anil Kumar Raghuwanshi, Kavita Burse
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 103 - Number 10
Year of Publication: 2014
Authors: Anil Kumar Raghuwanshi, Kavita Burse
10.5120/18112-9283

Anil Kumar Raghuwanshi, Kavita Burse . Capacity Management for Virtualized Data Centers using ECIES and Scheduling. International Journal of Computer Applications. 103, 10 ( October 2014), 41-45. DOI=10.5120/18112-9283

@article{ 10.5120/18112-9283,
author = { Anil Kumar Raghuwanshi, Kavita Burse },
title = { Capacity Management for Virtualized Data Centers using ECIES and Scheduling },
journal = { International Journal of Computer Applications },
issue_date = { October 2014 },
volume = { 103 },
number = { 10 },
month = { October },
year = { 2014 },
issn = { 0975-8887 },
pages = { 41-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume103/number10/18112-9283/ },
doi = { 10.5120/18112-9283 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:34:12.968672+05:30
%A Anil Kumar Raghuwanshi
%A Kavita Burse
%T Capacity Management for Virtualized Data Centers using ECIES and Scheduling
%J International Journal of Computer Applications
%@ 0975-8887
%V 103
%N 10
%P 41-45
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the growth Internet development cloud computing is novel technique to serve better and secure services. E-business is growing rapidly with the development of Internet. The cloud computing provides on demand self service methodology that authorizes users to request resources dynamically as a best benefit. The use of Cloud Computing is ahead reputation due to its mobility and massive availability in minimum cost. Here in this paper an efficient Capacity Management of user's data on datacenters is proposed using attribute and scheduling techniques. The proposed technique provides much efficient use of Virtualized data as compared to the existing technique.

References
  1. Kesavan, Mukil, Irfan Ahmad, Orran Krieger, Ravi Soundararajan, Ada Gavrilovska, and Karsten Schwan "Practical Compute Capacity Management for Virtualized Datacenters", IEEE Transactions On Cloud Computing, Vol. 1, No. 1, pp. 88 – 100, 2013.
  2. P. Mell and T. Grance, "The NIST definition of cloud Computing", online available at: http://csrc. nist. gov/publications/nistpubs/800-145/SP800-145. pdf, 2012.
  3. Swathi, T. , K. Srikanth, and S. Raghunath Reddy. "Virtualization In Cloud Computing. " International Journal of Computer Science and Mobile Computing, ISSN 2320–088X Vol. 3 Issue. 5, pp. 540-546, May- 2014 .
  4. Swathi Sambangi "Cloud Data Storage Services Considering Public Audit for Security", Global Journal of Computer Science and Technology Cloud and Distributed, ISSN: 0975-4172, Vol. 13, Issue 1, pp. 1 – 6, 2013.
  5. Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing," IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, May 2011.
  6. Srinivas, D. "Privacy-Preserving Public Auditing In Cloud Storage Security. " International Journal of computer science and Information Technologies,ISSN: 0975-9646, vol. 2, no. 6, pp. 2691-2693, 2011.
  7. Zhu, Yan, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu, and Stephen S. Yau. "Efficient provable data possession for hybrid clouds. " In Proceedings of the 17th ACM conference on Computer and communications security, pp. 756-758. ACM, 2010.
  8. Qian Wang, Cong Wang, Jin Li1, Kui Ren, and Wenjing Lou, "Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing" Proceedings of the 14th European conference on Research in computer security (ESORICS'09), pp. 355-370, 2009.
  9. Mishra, Ranjita, Sanjit Kumar Dash, Debi Prasad Mishra, and Animesh Tripathy. "A privacy preserving repository for securing data across the cloud. " In IEEE 3rd International Conference on Electronics Computer Technology (ICECT-2011), vol. 5, pp. 6-10, 2011.
  10. Greveler, Ulrich, Benjamin Justus, and Dennis Loehr. "A Privacy Preserving System for Cloud Computing. " In IEEE 11th International Conference on Computer and Information Technology (CIT- 2011), pp. 648-653, 2011.
  11. Qian Wang, Cong Wang, Jin Li1, Kui Ren, and Wenjing Lou, "Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing" Proceedings of the 14th European conference on Research in computer security(ESORICS'09), pp. 355-370, 2009.
  12. Stephen S. Yau, Fellow And Yin Yin "A Privacy Preserving Repository For Data Integration Across Data Sharing Services", IEEE Transactions On Services Computing, Vol. 1, No. 3, July-September 2008.
  13. Armbrust, Michael, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz, Andy Konwinski, Gunho Lee et al. "A view of cloud computing. " Communications of the ACM, vol. 53, no. 4, pp. 50-58, 2010.
  14. T. Wood et al. , "Black-Box and Gray-Box Strategies for Virtual Machine Migration," Proceedings of Fourth USENIX Conf. Networked Systems Design and Implementation (NSDI '07), pp. 17-17, 2007.
  15. Clark, Christopher, Keir Fraser, Steven Hand, Jacob Gorm Hansen, Eric Jul, Christian Limpach, Ian Pratt, and Andrew Warfield "Live migration of virtual machines", In Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation,Vol. 2, pp. 273-286, 2005.
  16. Liu, Haikun, Hai Jin, Cheng-Zhong Xu, and Xiaofei Liao "Performance and energy modeling for live migration of virtual machines", Cluster computing, vol. 16, no. 2, pp. 249-264, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Public Verifiability Cloud Storage Cloud Security Virtualization.