Total views : 248
Novel Technique to Control the Metering for Cloud Service using Common Deployment Model
Background: The customers always desire to get the required services from a single cloud. It will not provide a high quality of services to the end user because all cloud services are limited to some extent i.e. lack of standard. This problem has been overcome by using the multi-cloud architecture which will provide the high quality of services with reliability. Methods: There are various parameters are analyzed to achieve multi cloud integration. The proposed work focuses on metering control which is a one of the parameter to manage the risk during the time of interaction. Findings: The common deployment model acts as a broker in various cloud interaction to achieve a high quality of services to the customer. The features are extracted from the cloud based on the services which is provided by the service provider. The services are classified and risks are assessed for selecting the suitable services from the cloud. The perfect metering gives the better confident level to the customer using the selected services. There are two essentials implemented in the customer end and provider end they are service control and service registry. The objective of the proposed system is to control the services and its interactions with the supports of cloud metering. Application: The risk assessment has been implemented for assessing the Quality of Service (QoS) with reliable multi-cloud interaction.
Common Deployment Model, Cloud Control, Cloud Services, Metering, Risk Assessment.
- Cappelaere P, Sánchez S, Bernabé S, Scuri A, Mandl D, Plaza A. Cloud Implementation of a Full Hyperspectral Unmixing Chain Within the NASA Web Coverage Processing Service for EO-1. IEEE Journal Of Selected Topics In Applied Earth Observations and Remote Sensing. 2013; 6(2):408–18.
- Bagheri R, Jahanshahi M. Scheduling workflow applications on the heterogeneous cloud resources. Indian Journal of Science and Technology. 2015 Jun; 8(12):1–8. DOI: 10.17485/ijst/2015/v8i12/57984.
- Gu C, Huang H, Jia X. Power metering for virtual machine in cloud computing challenges and opportunities. IEEE Access. 2014 Sep; 2(1):1106–16.
- Baek J, Vu QH, Liu JK, Huang X, Xiang Y. A secure cloud computing based framework for big data information management of smart grid. IEEE Transactions On Cloud Computing. 2015 Jun; 3(2):233–44.
- Barsoum AF, Hasan MA. Provable multicopy dynamic data possession in cloud computing systems. IEEE Transactions on Information Forensics And Security. 2015 Mar; 10(3):485–97.
- Wang C, Ren K, Lou W, Li J. Toward publicly auditable secure cloud data storage services. IEEE Network. 2010 Aug; 24(4):19–24.
- Wang C, Wang Q, Ren K, Cao N, Lou W. Toward secure and dependable storage services in cloud computing. IEEE Transactions on Services Computing. 2012 Jun; 5(2):220– 32.
- Tang Y, Lee PPC, Lui JCS, Perlman R. Secure overlay cloud storage with access control and assured deletion. IEEE Transactions on Dependable and Secure Computing. 2012 Dec; 9(6):903–16.
- Chen HCH, Hu Y, Lee PPC, Tang Y. NCCloud: a networkcodingbased storage system in a cloud-of-clouds. IEEE Transactions on Computers. 2014 Jan; 63(1):31–44.
- Machado GS, Bocek T, Ammann M, Stiller B. A cloud storage overlay to aggregate heterogeneous cloud services. 2013 IEEE 38th Conference on Local Computer Networks (LCN); 2013 Oct. p. 597–605.
- Chen F, Xiang T, Yang Y, Chow SSM. Secure cloud storage meets with secure network coding. IEEE Transactions on Computers. 2014 May:1–14.
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.