A Result Base on Various Approaches of Load Balancing in Cloud Computing
Charanjeet Singh1 , Khushboo Bansal2
Section:Research Paper, Product Type: Journal Paper
Volume-4 ,
Issue-7 , Page no. 105-110, Jul-2016
Online published on Jul 31, 2016
Copyright © Charanjeet Singh, Khushboo Bansal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Charanjeet Singh, Khushboo Bansal, “A Result Base on Various Approaches of Load Balancing in Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.7, pp.105-110, 2016.
MLA Style Citation: Charanjeet Singh, Khushboo Bansal "A Result Base on Various Approaches of Load Balancing in Cloud Computing." International Journal of Computer Sciences and Engineering 4.7 (2016): 105-110.
APA Style Citation: Charanjeet Singh, Khushboo Bansal, (2016). A Result Base on Various Approaches of Load Balancing in Cloud Computing. International Journal of Computer Sciences and Engineering, 4(7), 105-110.
BibTex Style Citation:
@article{Singh_2016,
author = {Charanjeet Singh, Khushboo Bansal},
title = {A Result Base on Various Approaches of Load Balancing in Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2016},
volume = {4},
Issue = {7},
month = {7},
year = {2016},
issn = {2347-2693},
pages = {105-110},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1009},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1009
TI - A Result Base on Various Approaches of Load Balancing in Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - Charanjeet Singh, Khushboo Bansal
PY - 2016
DA - 2016/07/31
PB - IJCSE, Indore, INDIA
SP - 105-110
IS - 7
VL - 4
SN - 2347-2693
ER -
VIEWS | XML | |
1687 | 1370 downloads | 1531 downloads |
Abstract
In this paper we are studied cloud computing techniques. The Homomorphic property of various cryptosystems can be used to create secure voting systems, collision-resistant hash functions, and private information retrieval schemes and enable widespread use of cloud computing by ensuring the confidentiality of processed data.
Key-Words / Index Term
job scheduling, Directed Acyclic Graph, implement Min-Min, Shortest Job First.
References
[1] Amir Nahir “Distributed Oblivious Load Balancing Using Prioritized Job Replication”, ISSN 978-3-901882-48-7, IEEE, 2012.
[2] Hong Tao “A dynamic data allocation method with improved load-balancing for cloud storage system”, ISSN 978-1-84919-707-6, PP 220 – 225, IEEE, 2013
[3] Yuqi Zhang “Dynamic load-balanced multicast based on the Eucalyptus open-source cloud-computing system”,ISSN 978-1-61284-158-8, pp. 456 – 460, IEEE,2011.
[4] Magade, Krishnanjali A. “Techniques for load balancing in Wireless LAN's”, ISSN 978-1-4799-3357-0, PP 1831 – 1836, IEEE, 2014.
[5] Yean-Fu Wen “Load balancing job assignment for cluster-based cloud computing”, ISSN 14517061, PP 199 – 204, IEEE, 2014.
[6] De Mello, M.O.M.C “Load balancing routing for path length and overhead controlling in Wireless Mesh Networks”, ISSN 14630778, PP 1-6, IEEE, 2014.
[7] R. Angel Preethima, Margret Johnson, “Survey on Optimization Techniques for Task Scheduling in Cloud Environment”, IJARCSSE, Volume 3, Issue 12, December 2013.
[8] Ahmed DheyaaBasha, Irfan Naufal Umar, and Merza Abbas, Member, IACSIT “Mobile Applications as Cloud Computing: Implementation and Challenge”, 7865-7564, IEEE, 2013.
[9] Alabbadi, M.M“ Cloud computing for education and learning: Education and learning as a service (ELaaS)”, ISSN 978-1-4577-1748-2, PP 589 – 594, IEEE,2011.
[10] Cong Wang, Qian Wang, Kui Ren and Wenjing Lou “Ensuring Data Storage Security in Cloud Computing.” IEEE 2009.
[11] Farzad Sabahi, “Cloud Computing Security Threats and Responses," IEEE Trans. on Cloud Computing., vol. 11, no. 6, pp. 670 { 684, 2002.}
[12] Gaurav Raj, Dheerendra Singh, Abhay Bansal, “Using Batch Mode Heuristic Priority in Round Robin (PBRR) Scheduling”, IEEE, 2012.
[13] Jianfeng Yang, Zhibin Chen “Cloud Computing Research and Security Issues” Vol. 978-1-4244-5392-4/10/$26.00 ©2010 IEEE
[14] Jaber, A.N. “Use of cryptography in cloud computing”, ISSN978-1-4799-1506-4,PP 179 – 184,IEEE,2013.
[15] Kalagiakos, P. Karampelas, P “Cloud computing learning” 978-1-61284-831-0, 1 – 4, IEEE, 2011.
[16] Mehmet Yildiz, Jemal Abawajy, Tuncay Ercan and Andrew Bernoth “A Layered Security Approach for Cloud Computing Infrastructure” 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks. © 2009 IEEE.
[17] Md. Imrul Kayeset al. “Test Case Prioritization for Regression Testing Based on Fault Dependency” ISSN 978-1-4244-8679-3/11, IEEE, 2013
[18] Mohammed Achemlal, Saıd Gharoutand Chrystel Gabber “Trusted Platform Module as an Enabler for Security in Cloud Computing” Vol. 978-1-4577-0737-7/11/$26.00 ©2011 IEEE.
[19] Sravan Kumar R, AshutoshSaxena “Data Integrity Proofs in Cloud Storage” Vol. 978-0-7695-4355-0/11 $26.00 © 2011 IEEE.
[20] Qiang Guan, Chi-Chen Chiu, Song Fu “A Cloud Dependability Analysis Framework for Characterizing System Dependability in Cloud Computing Infrastructures”, ISSN 978-1-4673-4849-2, 11 – 20, IEEE, 2012.
[21] RuWei Huang, Si Yu, Wei Zhuang and Xiao Lin Gui, “Design of Privacy-Preserving Cloud Storage Framework" 2010 Ninth International Conference on Grid and Cloud Computing.
[22] RuWei Huang, Si Yu, Wei Zhuang and Xiao Lin Gui, “Research on Privacy-Preserving Cloud Storage Framework Supporting Cipher text Retrieval" 2011 Ninth International Conference on Grid and Cloud Computing.
[23] Ranjita Mishra, Sanjit Kumar Dash “A Privacy Preserving Repository for Securing Data across the Cloud” Vol 978-1-4244-8679-3/11/$26.00 ©2011 IEEE
[24] Ryan K. L. Ko, Markus Kirch berg, Bu Sung Lee “From System-centric to Data-centric Logging –Accountability, Trust & Security in Cloud Computing” IEEE Computer Society, 2011.
[25] Sang-Ho Na, Jun-Young Park, Eui-Nam Huh “Personal Cloud Computing Security Framework” 2010 IEEE Asia-Pacific Services Computing Conference.
[26] Akhil Goyal, Bharti, “A Study of Load Balancing in Cloud Computing using Soft Computing Techniques ”, International Journal of Computer Applications (0975 – 8887)