Open Access   Article Go Back

Performance Evaluation of Check Pointing and Threshold Algorithm for Load Balancing in Cloud Computing

Sheetal Karki1 , Anshika Goyal2

  1. Computer Science and Engineering, Faculty of Technology, Uttarakhand Technical University, Dehradun, India.
  2. Computer Science and Engineering, Faculty of Technology, Uttarakhand Technical University, Dehradun, India.

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-5 , Page no. 234-240, May-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i5.234240

Online published on May 31, 2018

Copyright © Sheetal Karki, Anshika Goyal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Sheetal Karki, Anshika Goyal, “Performance Evaluation of Check Pointing and Threshold Algorithm for Load Balancing in Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.234-240, 2018.

MLA Style Citation: Sheetal Karki, Anshika Goyal "Performance Evaluation of Check Pointing and Threshold Algorithm for Load Balancing in Cloud Computing." International Journal of Computer Sciences and Engineering 6.5 (2018): 234-240.

APA Style Citation: Sheetal Karki, Anshika Goyal, (2018). Performance Evaluation of Check Pointing and Threshold Algorithm for Load Balancing in Cloud Computing. International Journal of Computer Sciences and Engineering, 6(5), 234-240.

BibTex Style Citation:
@article{Karki_2018,
author = {Sheetal Karki, Anshika Goyal},
title = {Performance Evaluation of Check Pointing and Threshold Algorithm for Load Balancing in Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2018},
volume = {6},
Issue = {5},
month = {5},
year = {2018},
issn = {2347-2693},
pages = {234-240},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1968},
doi = {https://doi.org/10.26438/ijcse/v6i5.234240}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i5.234240}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1968
TI - Performance Evaluation of Check Pointing and Threshold Algorithm for Load Balancing in Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - Sheetal Karki, Anshika Goyal
PY - 2018
DA - 2018/05/31
PB - IJCSE, Indore, INDIA
SP - 234-240
IS - 5
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
797 451 downloads 339 downloads
  
  
           

Abstract

The cloud computing is practice of using a network of remote servers hosted on the internet to store, manage, and process data, rather than a local server or personal computer, it builds on the idea of using a remote server or infrastructure as a software service. The data that is stored in centralized virtual machine known as cloud and it can be managed by an end user using services provided. Cloud Service Provider (CSP) are designed for giving users the services based on their demands and are to be paid for being served. As there is large number of requests so the load increases, hence a Load balancing is done to reduce the energy consumption and maximize resource utilization. In this paper, the work is based on the task migration when virtual machine gets overloaded at the time of cloudlet execution. The CSPs are responsible to assign tasks to the most appropriate virtual machine for the execution. When any of the virtual machine gets overloaded, the task is migrated from one virtual machine to another or it could be queued which can be decided by the threshold and check pointing algorithm by minimizing the processing time, energy and resource consumption.

Key-Words / Index Term

Load Balancing, Virtual Machine Migration, Threshold Algorithm, Check Pointing Algorithm

References

[1] Sambit Kumar Mishra, Md Akram Khan, Bibhudatta Sahoo, Deepak Puthal and Mohammad S.Obaidat, “Time efficient dynamic Threshold-based load balancing technique for cloud computing”, 2017.
[2] N.R Rejinpaul, Maria Michael Visuwasam, “Checkpoint-based intelligent fault tolerance for cloud service providers”,2012.
[3] Vouk A.Mladen (2008), “Cloud Computing- Issues, Research and Implementations”, Journal of Computing and Information Technology, pp. 235-246.
[4] Randles, M.; Lamb, D.; Taleb-Bendiab, A., "A Comparative Study into Distributed Load Balancing Algorithms for Cloud Computing," Advanced Information Networking and Applications Workshops (WAINA), 2010 IEEE 24th International Conference on , vol., no., pp.551,556, 20-23 April 2010.
[5] Fang, Yiqiu, Fei Wang, and Junwei Ge. "A task scheduling algorithm based on load balancing in cloud computing." Web Information Systems and Mining. Springer Berlin Heidelberg, 2010. 271-277.
[6] Chaczko, Zenon, et al. "Availability and load balancing in cloud computing." International Conference on Computer and Software Modeling, Singapore. Vol. 14. 2011.
[7] Cloud Computing Bible. (2011)Wiley Publishing, Inc., Indianapolis, Indiana, p25.
[8] Shui Han, Jianchuan Xing, 2011 “Ensuring Data Storage Through A Novel Third Party Auditor Scheme in Cloud Computing” IEEE computer science & Technology, pp 264-268.
[9] Geo Jerry, Bai Xiaoying and Tsai T. Wei (2011) “Cloud Testing-Issues,challenges,Needs and Practice” ,Software engineering and international journal(SEIJ), pp. 09-23.
[10] Sean Carlin, Kevin Curran “Cloud Computing Security” International Journal of Ambient Computing and Intelligence, pp 14-19, 2011.
[11] Peter Mell, Timothy Grance , “The NIST Definition of Cloud Computing”, Recommendations of the National Institute of Standards and Technology, September 2011, Special Publication 800-145.
[12] Srivastava k.Abhinav,Yadav K.Divya (2012) “Taas:An Evolution of Testing Services using Cloud Computing”, International journal of advanced research in computer engineering& technology, pp. 42-49.
[13] Dr Nashaat el-Khameesy,Hossam Abdel Rahman, 2012 “A Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems” vol-3.
[14] Arora Pankaj, Wadhawan C.Rubal, Er.Ahuja P.Satinder, 2012, “Cloud Computing Security Issue in Infrastructure as a Service”, International Journal of Advance Research in Computer Science and Software Engineering.
[15] Habib, S. M., Hauke, S., & Ries, S. (2012) “Trust as a facilitator in cloud computing: a survey”, Journal of Cloud Computing , 01-18.
[16] Dawn Song, Elaine Shi, 2012 “Cloud Data Protection for the Masses” IEEE Computer Society, pp 39-45.
[17] Deyan Chen, Hong Zhao, 2012” Data Security and Privacy Protection Issues in Cloud Computing” International Conference on Computer Science and Electronics Engineering, pp 647-651.
[18] Kaur, Rajwinder, and Pawan Luthra. "Load Balancing in Cloud Computing." Proceedings of International Conference on Recent Trends in Information, Telecommunication and Computing, ITC. 2012.
[19]http://www.ibm.com/developerworks/cloud/library/cl-cloudserviesliaas.
[20] Srinivas.J, K. Venkata Subba Reddy, Dr. A. Moiz Qyser, (2012) “Cloud Computing Basics”, International journal of advanced research in computer and communication engineering , pp. 343-347.