Total views : 4302
Data Refining and Transforming via Cloud Technology through Local Desktop
Objectives: To fulfil the FeRAM and Cloud infrastructure for the avoidance of external Storage and for IAAS methods. Methods/Statistical Analysis: In this method, we approach with the Eucalyptus Technique and we use node controller to manipulate the exact performance. For interacting with the Device like FeRAM (Ferro Electric RAM) we used Euca2ools for performance statistics. This can be done from the analysis of Cloud Services with the reliable Cloud Controller. Findings: This model deals about the features that can be adopted in the Cloud computing environment along with the Usage of FeRAM's advantages. Our proposal is to adopt all values inside the FeRAM without the usage of Hard Disk. As the storage controller would be having all the patterns to conclude load balancer which simulates our workload along with the scaling listener, it maps with the additionally stored FeRAM. At this point, we would be integration the mechanism involved in the cloud controller and with the FeRAM as this would add more efficient with our works. In future, there will be a need for avoidance of external storage for storing large data. Applications: In this perspective, a novel optimization model has been proposed in which the cloud architecture is redefined with new RAM (FeRAM) and other external resources. Through Internet Connectivity, we make proper authentication and services with secured password protection manner (OTP) or email verification for every login transitions and thus we propose a model OUT_OF_HARDDRIVE method. The resources are provided to the user in the form of connecting bridge as virtual servers and are possibly distributed, running in cloud environment via Internet.
Data Security Model, Encryption and Decryption in Cloud Computing, FeRAM, Heterogeneous Workloads.
- Bhathiya W, Calheiros RN, Buyya R. The Cloud Computing and Distributed Systems (CLOUDS) Laboratory Department of Computer Science and Software Engineering The University of Melbourne, Australia. Cloud Analyst: A Cloud Sim-based Visual Modeler for Analysing Cloud Computing Environments and Applications.
- Agrawal T, Agarwal AK, Singh SK. Cloud Computing Security: Issues and Challenges. 3rd International Conference on System Modeling & Advancement in Research Trends (SMART). College of Computing Sciences and Information Technology (CCSIT), Teerthanker Mahaveer University, Moradabad; 2014.
- Erl T, Robert C, Amin N. Cloud computing design patterns. Prentice Hall Press; 2015. PMid:26718687
- Erl T, Cope R, Amin N. Cloud Computing Design Patterns. Published by Pearson Educations, Inc. Chapter 4: Redundant Behaviour and Hypervisor; India.
- Subashini S, Veeraruna K. A survey on security issues in service delivery models of cloud computing. Journal of network and computer applications. 2011; 34(1):1–11. Crossref.
- AMAZON, AWS. Public Data Sets on AWS. [online]. 2008. Available from: http://aws.amazon.com/publicdatasets/.
- Cloud Security Alliance. Guidance for identity & access management. Available from: https://cloudsecurityalliance.org/. Date Accessed: 02 May 2017.
- UC Berkeley Reliable Adaptive Distributed Systems Laboratory. Available from: http://radlab.cs.berkeley.edu/. Last Accessed: 02 May 2017.
- Thamizhselvan M, Raghuraman R, Manoj SG, Paul PV. Data security model for Cloud Computing using V-GRT methodology. IEEE 9th International Conference on Intelligent Systems and Control (ISCO). 2015 Jan. p.1–6. Crossref.
- Thamizhselvan M, Raghuraman R, Manoj SG, Paul PV. A novel security model for cloud using trusted third party encryption. IEEE International Conference on Innovations in Information Embedded and Communication Systems (ICIIECS). 2015 Mar. p. 1–5. Crossref.
- Paul PV, Aishvaria P, Yuvarani S. Cloudinar Hall- An Extended Study. International IEEE Conference on Innovations in Power and Advanced Computing Technologies [i-PACT2017]; Chennai; 2017. p. 1–5.
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.