A Survey on Cloud Environment Security Risk and Remedy

Author(s):  
Asish Aich ◽  
Alo Sen ◽  
Satya Ranjan Dash
Author(s):  
P. Sanyasi Naidu ◽  
Babita Bhagat

In the distributed data-intensive computing environment, securely assigning tasks to appropriate machines is a big job scheduling problem. The complexity of this problem increases with the number of jobs and their job times. Several meta-heuristic algorithms including particle swarm optimization (PSO) technique and variable neighborhood particle swarm optimization (VNPSO) technique are employed to solve the problem to a certain extent. This paper proposes a modified PSO with scout adaptation (MPSO-SA) algorithm, which uses a cyclic term called mutation operator, to solve the job scheduling problem in the cloud environment. The comparative study between the proposed MPSO-SA scheduling mechanism and the conventional scheduling algorithms show that the proposed method decreases the probability of security risk on scheduling the jobs.


2020 ◽  
pp. 51-74
Author(s):  
I. A. Bashmakov

The article presents the key results of scenario projections that underpinned the Strategy for long-term low carbon economic development of the Russian Federation to 2050, including analysis of potential Russia’s GHG emission mitigation commitments to 2050 and assessment of relevant costs, benefits, and implications for Russia’s GDP. Low carbon transformation of the Russian economy is presented as a potential driver for economic growth that offers trillions-of-dollars-worth market niches for low carbon products by mid-21st century. Transition to low carbon economic growth is irreversible. Lagging behind in this technological race entails a security risk and technological backwardness hazards.


Author(s):  
Shailendra Raghuvanshi ◽  
Priyanka Dubey

Load balancing of non-preemptive independent tasks on virtual machines (VMs) is an important aspect of task scheduling in clouds. Whenever certain VMs are overloaded and remaining VMs are under loaded with tasks for processing, the load has to be balanced to achieve optimal machine utilization. In this paper, we propose an algorithm named honey bee behavior inspired load balancing, which aims to achieve well balanced load across virtual machines for maximizing the throughput. The proposed algorithm also balances the priorities of tasks on the machines in such a way that the amount of waiting time of the tasks in the queue is minimal. We have compared the proposed algorithm with existing load balancing and scheduling algorithms. The experimental results show that the algorithm is effective when compared with existing algorithms. Our approach illustrates that there is a significant improvement in average execution time and reduction in waiting time of tasks on queue using workflowsim simulator in JAVA.


Author(s):  
M. Chaitanya ◽  
K. Durga Charan

Load balancing makes cloud computing greater knowledgeable and could increase client pleasure. At reward cloud computing is among the all most systems which offer garage of expertise in very lowers charge and available all the time over the net. However, it has extra vital hassle like security, load administration and fault tolerance. Load balancing inside the cloud computing surroundings has a large impact at the presentation. The set of regulations relates the sport idea to the load balancing manner to amplify the abilties in the public cloud environment. This textual content pronounces an extended load balance mannequin for the majority cloud concentrated on the cloud segregating proposal with a swap mechanism to select specific strategies for great occasions.


Author(s):  
. Monika ◽  
Pardeep Kumar ◽  
Sanjay Tyagi

In Cloud computing environment QoS i.e. Quality-of-Service and cost is the key element that to be take care of. As, today in the era of big data, the data must be handled properly while satisfying the request. In such case, while handling request of large data or for scientific applications request, flow of information must be sustained. In this paper, a brief introduction of workflow scheduling is given and also a detailed survey of various scheduling algorithms is performed using various parameter.


Author(s):  
P. Jeyadurga ◽  
S. Ebenezer Juliet ◽  
I. Joshua Selwyn ◽  
P. Sivanisha

The Internet of things (IoT) is one of the emerging technologies that brought revolution in many application domains such as smart cities, smart retails, healthcare monitoring and so on. As the physical objects are connected via internet, security risk may arise. This paper analyses the existing technologies and protocols that are designed by different authors to ensure the secure communication over internet. It additionally focuses on the advancement in healthcare systems while deploying IoT services.


Author(s):  
Umesh Banodha ◽  
Praveen Kumar Kataria

Cloud is an emerging technology that stores the necessary data and electronic form of data is produced in gigantic quantity. It is vital to maintain the efficacy of this data the need of data recovery services is highly essential. Cloud computing is anticipated as the vital foundation for the creation of IT enterprise and it is an impeccable solution to move databases and application software to big data centers where managing data and services is not completely reliable. Our focus will be on the cloud data storage security which is a vital feature when it comes to giving quality service. It should also be noted that cloud environment comprises of extremely dynamic and heterogeneous environment and because of high scale physical data and resources, the failure of data centre nodes is completely normal.Therefore, cloud environment needs effective adaptive management of data replication to handle the indispensable characteristic of the cloud environment. Disaster recovery using cloud resources is an attractive approach and data replication strategy which attentively helps to choose the data files for replication and the strategy proposed tells dynamically about the number of replicas and effective data nodes for replication. Thus, the objective of future algorithm is useful to help users together the information from a remote location where network connectivity is absent and secondly to recover files in case it gets deleted or wrecked because of any reason. Even, time oriented problems are getting resolved so in less time recovery process is executed.


Sign in / Sign up

Export Citation Format

Share Document