Efficient Resource Allocation Using Optimized Data Stack Technique in Cloud
Keywords:
Resource Allocation, cloud computing, cloud environmentAbstract
A wide range of advantageous features, including resource pooling, rapid elasticity, approximated services, on-demand self-services, and more, have made cloud computing extremely popular. But distributing resources securely among users with better authentication and privacy is a difficult problem in cloud networks. Thus, for the equitable exploitation of storage resources, an effective cloud resource design is suggested in this work. The information is kept up to date, organized, and available to authorized users with enhanced allocation properties that remove internal dangers. By supplying a unique storage key, the Optimized Data Stack (ODS) encryption technique locates the right storage site and efficiently allocates resources. The suggested method gives users immediate access to storage sites while offering high privacy and enhanced secrecy. Using Visual C#, the simulation is run, and the results show that the suggested method allocates resources quickly while making effective use of cloud server storage.
Downloads
References
SiqianGong;BeibeiYin;ZhengZheng;Kai-YuanCai,2019, “Adaptive Multivariable Control for Multiple Resource Allocation of Service-Based Systems in Cloud Computing”, IEEE Access, Vol: 7, pp: 13817 – 13831.
JungminSon;RajkumarBuyya, 2019, “Priority-Aware VM Allocation and Network Bandwidth Provisioning in Software-Defined Networking (SDN)-Enabled Clouds”, IEEE Transactions on Sustainable Computing, Vol: 4, No: 1,pp: 17-28.
JyotiskaNathKhasnabish;MohammadFirojMithani;Shrisha Rao, 2017, “Tier-Centric Resource Allocation in Multi-Tier Cloud Systems”, IEEE Transactions on Cloud Computing,Vol: 5, No: 3, pp: 576-589.
RehanaBegam;WeiWang;Dakai Zhu, 2020, “TIMER-Cloud: Time-Sensitive VM Provisioning in Resource-Constrained Clouds”,IEEE Transactions on Cloud Computing, Vol: 8, No: 1, pp: 297-311.
Wei Wei;XunliFan;HoubingSong;XiumeiFan;Jiachen Yang, 2018 , “Imperfect Information Dynamic Stackelberg Game Based Resource Allocation Using Hidden Markov for Cloud Computing”,IEEE Transactions on Services Computing, Vol: 11, No: 1, pp: 78-89.
Lei Jiao;Antonia Maria Tulino;JaimeLlorca;YueJin;Alessandra Sala, 2017, “Smoothed Online Resource Allocation in Multi-Tier Distributed Cloud Networks, IEEE/ACM Transactions on Networking, Vol: 25, No: 4, pp: 2556 – 2570.
SuchintanMishra;Manmath Narayan Sahoo;SambitBakshi;Joel J. P. C. Rodrigues, 2020, “Dynamic Resource Allocation in Fog-Cloud Hybrid Systems Using Multicriteria AHP Techniques”, IEEE Internet of Things Journal,Vol: 7, No: 9, pp: 8993 – 9000.
Dan Gonzales;Jeremy M. Kaplan;EvanSaltzman;ZevWinkelman;Dulani Woods, 2017, “ Cloud-Trust—a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds,IEEE Transactions on Cloud Computing, Vol: 5, No: 3, pp: 523-536.
Xiang Li;QixuWang;XiaoLan;XingshuChen;NingZhang;Dajiang Chen, 2019, “Enhancing Cloud-Based IoT Security Through Trustworthy Cloud Service: An Integration of Security and Reputation Approach”, IEEE Access,Vol: 7, pp: 9368-9383.
Jesus Luna;AhmedTaha;RubenTrapero;NeerajSuri,2017, “Quantitative Reasoning about Cloud Security Using Service Level Agreements”,IEEE Transactions on Cloud Computing, Vol: 5, No: 3, pp: 457-471.
TalalHalabi;Martine Bellaiche,2020, “Towards Security-Based Formation of Cloud Federations: A Game Theoretical Approach”,IEEE Transactions on Cloud Computing, Vol: 8, No: 3, pp: 928-942.
AbirAwad;AdrianMatthews;YuansongQiao;Brian Lee, 2018, “Chaotic Searchable Encryption for Mobile Cloud Storage,IEEE Transactions on Cloud Computing, Vol: 6, No: 2, pp: 440-452.
Qi Jiang;JianfengMa;Fushan Wei, 2018, “On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services, IEEE Systems Journal, Vol: 12, No: 2, pp: 2039 – 2042.
JindanZhang;RongxingLu;BaocangWang;Xu An Wang, 2021, “Comments on “Privacy-Preserving Public Auditing Protocol for Regenerating-Code-Based Cloud Storage”,IEEE Transactions on Information Forensics and Security, Vol: 16, pp: 1288 – 1289.
FanyuKong;YufengZhou;BinXia;LiPan;Limin Zhu , 2019, “A Security Reputation Model for IoT Health Data Using S-AlexNet and Dynamic Game Theory in Cloud Computing Environment”,IEEE Access, Vol: 7, pp: 161822 – 161830.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.