CFP last date
20 January 2025
Reseach Article

Avoid Vendor Lock-In using Virtual Adaptive Framework (VAF)

by Ch. Siva Rama Krishna, B. Tarakeswara Rao, B. Sathyanarayana Reddy
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 133 - Number 1
Year of Publication: 2016
Authors: Ch. Siva Rama Krishna, B. Tarakeswara Rao, B. Sathyanarayana Reddy
10.5120/ijca2016907720

Ch. Siva Rama Krishna, B. Tarakeswara Rao, B. Sathyanarayana Reddy . Avoid Vendor Lock-In using Virtual Adaptive Framework (VAF). International Journal of Computer Applications. 133, 1 ( January 2016), 8-12. DOI=10.5120/ijca2016907720

@article{ 10.5120/ijca2016907720,
author = { Ch. Siva Rama Krishna, B. Tarakeswara Rao, B. Sathyanarayana Reddy },
title = { Avoid Vendor Lock-In using Virtual Adaptive Framework (VAF) },
journal = { International Journal of Computer Applications },
issue_date = { January 2016 },
volume = { 133 },
number = { 1 },
month = { January },
year = { 2016 },
issn = { 0975-8887 },
pages = { 8-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume133/number1/23748-2016907720/ },
doi = { 10.5120/ijca2016907720 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:29:53.697290+05:30
%A Ch. Siva Rama Krishna
%A B. Tarakeswara Rao
%A B. Sathyanarayana Reddy
%T Avoid Vendor Lock-In using Virtual Adaptive Framework (VAF)
%J International Journal of Computer Applications
%@ 0975-8887
%V 133
%N 1
%P 8-12
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The greater part of the present cloud computing platforms offer Infrastructure as a Service (IaaS) model, which expects to procurement fundamental virtualized computing assets as on interest and element Services. By the by, a single cloud does not have boundless assets to offer to its clients, consequently the thought of an Inter-Cloud environment where a cloud can utilize the infrastructure assets of different clouds. Because of vendor lock-in snags in broad daylight cloud computing the capacity to define transferable cloud-based Services is pivotal yet has not yet been comprehended palatably. . The genuine cutting edge cloud services configuration does not methodically manage how to define, send and work cross-platform competent cloud services. This is mainly because of the inherent multifaceted nature of the field and contrasts in subtle elements between a lot of existing open and private cloud infrastructures. In any case, there is no basic structure in presence that permits the service proprietors to consistently procurement even some essential services across different cloud Service Providers, to address the above issues I recommend Virtualized Private cloud with versatile system, which drives the displayed issues, thus keeping in mind the end goal to give the boundless services, it will demonstrate high security, data accessibility, data integrity with elite.

References
  1. A. Rowstron, P. Druschel, Pastry: Scalable, decentralized object location,and routing for Large-Scale Peer-to-Peer systems, in: Middleware 2001, 2001.
  2. B. Y. Zhao, L. Huang, J. Stribling, S. C. Rhea, A. D. Joseph, J. D. Kubiatowicz, Tapestry: a resilient global-scale overlay for service deployment, Selected Areas in Communications, IEEE Journal on.
  3. P. ”Maymounkov, D. Mazi`eres, ”kademlia: A peer-to-peer information system based on the xor metric”, in: ”Revised Papers from the First International Workshop on Peer-to-Peer Systems”, ”Springer-Verlag”,”2002”.
  4. J. Douceur, The sybil attack, in: Peer-to-Peer Systems, Springer Berlin / Heidelberg, 2002.
  5. D. Taylor, T. Wu, N. Mavrogiannopoulos, T. Perrin, Using the Secure Remote Password (SRP) Protocol for TLS Authentication, RFC 5054, 2007.
  6. A. S. Dan Boneh, B. Waters, Functional encryption: a new vision for public-key cryptography, Commun. ACM 55 (11) (2012) 56–64.
  7. Barr, J. (2010) Host Your Web Site in the Cloud: Amazon Web Services Mad Easy. Sitepoint.
  8. Kratzke, N. (2012) Cloud Computing Costs and Benefits—An IT Management Point of View. In: Ivanov, I., van Sinderen,M. and Shiskov, B., Eds., Cloud Computing and Services Sciences, Springer, New York, 185-203.
  9. Kratzke, N. (2011) Overcoming Ex Ante Cost Intransparency of Clouds—Using System Analogies and a Corresponding Cost Estimation Model. CLOSER 2011—1st International Conference on Cloud Computing and Services Science (Special Session on Business Systems and Aligned IT Services—BITS 2011), Noordwijkerhout, 7-9 May 2011, 707-716.
  10. Satzger, B., Hummer, W., Inzinger, C., Leitner, P. and Dustdar, S. (2013) Winds of Change: From Vendor Lock-In to the Meta Cloud. Internet Computing, IEEE, 17, 69-73.
  11. Amazon Web Services (2014) Whitepaper “Overview of Amazon Web Services”.https://s3.amazonaws.com/awsmedia/AWS_Overview.pdf
  12. DMTF, CIMI (Cloud Infrastructure Management Interface) (2014) Last Access 30th June 2014.http://dmtf.org/standards/cloud
  13. Fog.io (The Ruby Cloud Services Library) (2014) Last Access 30th June 2014. http://fog.io
  14. de Alfonso, C., Caballer, M., Alvarruiz, F., Molto, G. and Hernandez, V. (2011) Infrastructure Deployment over the Cloud. Proceedings of 2011 IEEE 3rd International Conference on Cloud Computing Technology and Science (Cloud-Com), Athens, 29 November-1 December 2011, 517-521.
  15. Juve, G. and Deelman, E. (2011) Automating Application Deployment in Infrastructure Clouds. Proceedings of 2011 IEEE 3rd International Conference on Cloud Computing Technology and Science (CloudCom), Athens, 29 November-1 December 2011, 658-665.
  16. Lenk, A., Danschel, C., Klems, M., Bermbach, D. and Kurze, T. (2011) Requirements for an IaaS Deployment Language in Federated Clouds. Proceedings of SOCA, Irvine, 12-14 December 2011, 1-4.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Vendor Lock-In Cross-Platform Interclub Virtual adaptive framework