Proposed Techniques for Energy saving on Datacenters in cloud Environment

ITTI Dogra


Cloud Computing represents a relatively new computing model, there is a great deal of uncertainty about how security at all levels (e.g., network, host, application, and data levels) can be achieved and how applications security is moved to Cloud Computing. That uncertainty has consistently led information executives to state that security is their number one concern with Cloud Computing. Security concerns relate to risk areas such as external data storage, dependency on the “public” internet, lack of control, multi-tenancy and integration with internal security. In the first scenario we have worked on 10 servers and 5 users whereas in second case we have worked on 10 servers and 10 users and finaly in the last case on 10 servers and 15 users and we have calculated Energy consumptions at different levels in all the three cases.

Full Text:



Raj Kumar Buyya, Rajiv Ranjan, Rodrigo N. Calheiros, “Modeling and si mulation of scalable cloud computing environments and the CloudSim toolkit: challenges and opportunities”, proceedings of the 7th high performance computing and simulation conference, Leipzig, Germany, June 21-24, 2009.

Yiyu Chen, Amitayu Das, Wubi Qin, Anand Sivasubramaniam,Qian Wang, Natarajan Gautam, “Managing Server Energy and Operational costs in Hosting centers”, Proceedings of the ACM Sigmetrics international conference on measurement and modeling of computer systems, ACM, New York, pp: 303–314, 2005.

Gong Chen, Wenbo He, Jie Liu, Suman Nath, Leonidas Rigas, Lin Xiao, Feng Zhao, “Energy-aware Server Provisioning and Load Dispatching for Connection-Intensive Internet Services”, in 5th USENIX symposium on networked systems design and implementation”, PP: 337-350, Berkeley, USA 2008.[4] Xiaobo Fan, Wolf-Dietrich Weber, Luiz André Barroso, “Power provisioning for a warehouse-sized computer”, Proceedings of the ACM international symposium on computer architecture, San Diego, CA, June 2007.

Fan Xiaobo, Weber Wolf-Dietrich, Barroso Luiz Andre, “Power provisioning for warehouse sized computer”, Proceedings of the 34th annual international symposium on computer architecture (ISCA), ACM, pp: 13–23, New York, June 2007.

D. New and M. Rose, Reliable Delivery for Syslog, Request for Comment RFC 3195, Internet Engineering Task Force, Network Working Group, Nov. 2001

B. Schneier and J. Kelsey, “Security audit logs to support computer forensics,” ACM Trans. Inform. Syst. Security, vol. 2, no. 2, pp. 159–176, May 1999.

J. E. Holt, “Logcrypt: Forward security and public verification for secure audit logs,” in Proc. 4th Australasian Inform. Security Workshop, 2006, pp. 203–211.

R. Dingledine, N. Mathewson, and P. Syverson, “Tor: The secondgeneration onion router,” in Proc. 12th Ann. USENIX Security Symp., Aug. 2004, pp. 21–21.

The Tor Project, Inc. (2011, Sep.) Tor: Anonymity Online [Online]. Available:

D. Dolev and A. Yao, “On the security of public key protocols,” IEEE Trans. Inform. Theory, vol. 29, no. 2, pp. 198–208, Mar. 1983.

A. Shamir, “How to share a secret,” Commun. ACM, vol. 22, no. 11, pp. 612–613, Nov. 1979.


  • There are currently no refbacks.

Copyright (c) 2016 VNN Journal of Computers & Technology

sofia pro fontDesign & Maintained By Ruler Dynasty InfoTech Pvt Ltd