Efficient Resource Allocation Using Optimized Data Stack Technique in Cloud

Authors

  • N. Sureshbabu, R. Pragaladan, T Kannadasan

Keywords:

Resource Allocation, cloud computing, cloud environment

Abstract

A wide range of advantageous features, including resource pooling, rapid elasticity, approximated services, on-demand self-services, and more, have made cloud computing extremely popular. But distributing resources securely among users with better authentication and privacy is a difficult problem in cloud networks. Thus, for the equitable exploitation of storage resources, an effective cloud resource design is suggested in this work. The information is kept up to date, organized, and available to authorized users with enhanced allocation properties that remove internal dangers. By supplying a unique storage key, the Optimized Data Stack (ODS) encryption technique locates the right storage site and efficiently allocates resources. The suggested method gives users immediate access to storage sites while offering high privacy and enhanced secrecy. Using Visual C#, the simulation is run, and the results show that the suggested method allocates resources quickly while making effective use of cloud server storage.

Downloads

Download data is not yet available.

References

SiqianGong;BeibeiYin;ZhengZheng;Kai-YuanCai,2019, “Adaptive Multivariable Control for Multiple Resource Allocation of Service-Based Systems in Cloud Computing”, IEEE Access, Vol: 7, pp: 13817 – 13831.

JungminSon;RajkumarBuyya, 2019, “Priority-Aware VM Allocation and Network Bandwidth Provisioning in Software-Defined Networking (SDN)-Enabled Clouds”, IEEE Transactions on Sustainable Computing, Vol: 4, No: 1,pp: 17-28.

JyotiskaNathKhasnabish;MohammadFirojMithani;Shrisha Rao, 2017, “Tier-Centric Resource Allocation in Multi-Tier Cloud Systems”, IEEE Transactions on Cloud Computing,Vol: 5, No: 3, pp: 576-589.

RehanaBegam;WeiWang;Dakai Zhu, 2020, “TIMER-Cloud: Time-Sensitive VM Provisioning in Resource-Constrained Clouds”,IEEE Transactions on Cloud Computing, Vol: 8, No: 1, pp: 297-311.

Wei Wei;XunliFan;HoubingSong;XiumeiFan;Jiachen Yang, 2018 , “Imperfect Information Dynamic Stackelberg Game Based Resource Allocation Using Hidden Markov for Cloud Computing”,IEEE Transactions on Services Computing, Vol: 11, No: 1, pp: 78-89.

Lei Jiao;Antonia Maria Tulino;JaimeLlorca;YueJin;Alessandra Sala, 2017, “Smoothed Online Resource Allocation in Multi-Tier Distributed Cloud Networks, IEEE/ACM Transactions on Networking, Vol: 25, No: 4, pp: 2556 – 2570.

SuchintanMishra;Manmath Narayan Sahoo;SambitBakshi;Joel J. P. C. Rodrigues, 2020, “Dynamic Resource Allocation in Fog-Cloud Hybrid Systems Using Multicriteria AHP Techniques”, IEEE Internet of Things Journal,Vol: 7, No: 9, pp: 8993 – 9000.

Dan Gonzales;Jeremy M. Kaplan;EvanSaltzman;ZevWinkelman;Dulani Woods, 2017, “ Cloud-Trust—a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds,IEEE Transactions on Cloud Computing, Vol: 5, No: 3, pp: 523-536.

Xiang Li;QixuWang;XiaoLan;XingshuChen;NingZhang;Dajiang Chen, 2019, “Enhancing Cloud-Based IoT Security Through Trustworthy Cloud Service: An Integration of Security and Reputation Approach”, IEEE Access,Vol: 7, pp: 9368-9383.

Jesus Luna;AhmedTaha;RubenTrapero;NeerajSuri,2017, “Quantitative Reasoning about Cloud Security Using Service Level Agreements”,IEEE Transactions on Cloud Computing, Vol: 5, No: 3, pp: 457-471.

TalalHalabi;Martine Bellaiche,2020, “Towards Security-Based Formation of Cloud Federations: A Game Theoretical Approach”,IEEE Transactions on Cloud Computing, Vol: 8, No: 3, pp: 928-942.

AbirAwad;AdrianMatthews;YuansongQiao;Brian Lee, 2018, “Chaotic Searchable Encryption for Mobile Cloud Storage,IEEE Transactions on Cloud Computing, Vol: 6, No: 2, pp: 440-452.

Qi Jiang;JianfengMa;Fushan Wei, 2018, “On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services, IEEE Systems Journal, Vol: 12, No: 2, pp: 2039 – 2042.

JindanZhang;RongxingLu;BaocangWang;Xu An Wang, 2021, “Comments on “Privacy-Preserving Public Auditing Protocol for Regenerating-Code-Based Cloud Storage”,IEEE Transactions on Information Forensics and Security, Vol: 16, pp: 1288 – 1289.

FanyuKong;YufengZhou;BinXia;LiPan;Limin Zhu , 2019, “A Security Reputation Model for IoT Health Data Using S-AlexNet and Dynamic Game Theory in Cloud Computing Environment”,IEEE Access, Vol: 7, pp: 161822 – 161830.

Downloads

Published

26.03.2024

How to Cite

N. Sureshbabu. (2024). Efficient Resource Allocation Using Optimized Data Stack Technique in Cloud. International Journal of Intelligent Systems and Applications in Engineering, 12(21s), 2333–2337. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5837

Issue

Section

Research Article