Round Robin Scheduling - A noval approach towards load balancing on Datacenters in cloud

gurpreet Kaur

Abstract


Cloud computing is a term used to describe both a platform and type of application. A cloud computing platform dynamically provisions, configures, reconfigures, and deprovisions servers as needed. As Cloud Service Provider take care of a number of clients each day, they can become overwhelmed and may even come up against technical outages. This can lead to your business processes being temporarily suspended. Additionally, if your internet connection is offline, you will not be able to access any of your applications, server or data from the cloud. In this paper we have implemented the work in cloud analyst by taking 50 users and 5 data centers at different locations and calculated the average response time and load balancingusing rapid scheduling technique.


Full Text:

PDF

References


Indrajit Ray, Kirill Belyaev, Mikhail Strizhov, DieudonneMulamba, MariappanRajaram “Secure Logging As a Service—Delegating Log Management to the Cloud” IEEE SYSTEMS JOURNAL, VOL. 7, NO. 2, JUNE 2013

[2] U.S. Department of Health and Human Services. (2011, Sep.). HIPAA—General Information [Online]. Available: https://www.cms.gov/hipaageninfo

PCI Security Standards Council. (2006, Sep.) Payment Card Industry (PCI) Data Security Standard—Security Audit Procedures Version 1.1 [Online]. Available: https://www.pcisecuritystandards.org/pdfs/ pci−audit−procedures−v1-1.pdf

Sarbanes-Oxley Act 2002. (2002, Sep.). A Guide to the Sarbanes-Oxley Act [Online]. Available: http://www.soxlaw.com/

C. Lonvick, The BSD Syslog Protocol, Request for Comment RFC 3164, Internet Engineering Task Force, Network Working Group, Aug. 2001.

D. New and M. Rose, Reliable Delivery for Syslog, Request for Comment RFC 3195, Internet Engineering Task Force, Network Working Group, Nov. 2001

B. Schneier and J. Kelsey, “Security audit logs to support computer forensics,” ACM Trans. Inform. Syst. Security, vol. 2, no. 2, pp. 159–176, May 1999.

J. E. Holt, “Logcrypt: Forward security and public verification for secure audit logs,” in Proc. 4th Australasian Inform. Security Workshop, 2006, pp. 203–211.

R. Dingledine, N. Mathewson, and P. Syverson, “Tor: The secondgeneration onion router,” in Proc. 12th Ann. USENIX Security Symp., Aug. 2004, pp. 21–21.

The Tor Project, Inc. (2011, Sep.) Tor: Anonymity Online [Online]. Available: http://www.torproject.org

D. Dolev and A. Yao, “On the security of public key protocols,” IEEE Trans. Inform. Theory, vol. 29, no. 2, pp. 198–208, Mar. 1983.

A. Shamir, “How to share a secret,” Commun. ACM, vol. 22, no. 11, pp. 612–613, Nov. 1979.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2016 VNN Journal of Computers & Technology

sofia pro fontDesign & Maintained By Ruler Dynasty InfoTech Pvt Ltd