Open Access   Article Go Back

A Survey over Cloud Scheduling Algorithm in Cloud Computing

Mukesh Kumar1 , Mukesh Kumar2 , Devendra Singh Rathore3

Section:Survey Paper, Product Type: Journal Paper
Volume-7 , Issue-4 , Page no. 783-787, Apr-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i4.783787

Online published on Apr 30, 2019

Copyright © Mukesh Kumar, Mukesh Kumar, Devendra Singh Rathore . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Mukesh Kumar, Mukesh Kumar, Devendra Singh Rathore, “A Survey over Cloud Scheduling Algorithm in Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.783-787, 2019.

MLA Style Citation: Mukesh Kumar, Mukesh Kumar, Devendra Singh Rathore "A Survey over Cloud Scheduling Algorithm in Cloud Computing." International Journal of Computer Sciences and Engineering 7.4 (2019): 783-787.

APA Style Citation: Mukesh Kumar, Mukesh Kumar, Devendra Singh Rathore, (2019). A Survey over Cloud Scheduling Algorithm in Cloud Computing. International Journal of Computer Sciences and Engineering, 7(4), 783-787.

BibTex Style Citation:
@article{Kumar_2019,
author = {Mukesh Kumar, Mukesh Kumar, Devendra Singh Rathore},
title = {A Survey over Cloud Scheduling Algorithm in Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {7},
Issue = {4},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {783-787},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4116},
doi = {https://doi.org/10.26438/ijcse/v7i4.783787}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i4.783787}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4116
TI - A Survey over Cloud Scheduling Algorithm in Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - Mukesh Kumar, Mukesh Kumar, Devendra Singh Rathore
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 783-787
IS - 4
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
299 223 downloads 131 downloads
  
  
           

Abstract

Cloud computing and its components make use of their combine efforts to process input request to any cloud architecture. Cloud components such as virtual machine Vm, Cloud Data center DC, Broker request Br and configure a cloud scenario. Cloud computing component make use of request, resource and its utilization analysis to process any of the algorithm. In this paper, An Advance Algorithm named VMERRU (Virtual machine energy resource request utilization) is proposed. The approach also make use of utilizing monitoring of energy , resource usage count, input request requirement and matching requirement of assigning DC, VM to it. Thus an optimal request handling algorithm with parallel computation is proposed. An implementation is performed using CloudSim API cloud analyst simulator and further computation shows the efficiency of proposed algorithm.

Key-Words / Index Term

Resource Optimization, Cloud Sim, Data Sharing, Virtualization, VMERRU, Parallel Computing, Request Analysis, Cloud Component Scheduling

References

[1] Bharathy, S. D., & Ramesh, T. (2014). “Securing Data Stored in Clouds Using Privacy Preserving Authenticated Access Control”. Proc. IJCSMC, 3(4), 1069-1074.
[2]. Binbusayyis, A., & Zhang, N. (2015, June). “Decentralized attributebased encryption scheme with scalable revocation for sharing data in public cloud servers”. In Cloud Technologies and Applications (CloudTech), 2015 International Conference on (pp. 1-8). IEEE.
[3]. Chen, J., & Ma, H. (2014, June). “Efficient decentralized attributebased access control for cloud storage with user revocation”. In 2014 IEEE International Conference on Communications (ICC) (pp. 3782- 3787). IEEE.
[4]. Ganeshkumar, M., & Chow, S. S. (2009, November). “Improving privacy and security in multi-authority attribute-based encryption”. In Proceedings of the 16th ACM conference on Computer and communications security (pp. 121-130). ACM.
[5]. Maharajanavar, S. “Anonymous Authentication of Decentralized Access Control of Data Stored in Cloud”. International Journal on Recent and Innovation Trends in Computing and Communication ISSN, 2321- 8169.
[6]. Ruj, S., Stojmenovic, M., & Nayak, A. (2014). “Decentralized access control with anonymous authentication of data stored in clouds”. IEEE transactions on parallel and distributed systems, 25(2), 384-394.
[7]. Vijayalakshmi, A., & Arunapriya, R. (2014). “Authentication of data storage using decentralized access control in clouds”. Journal of Global Research in Computer Science, 5(9).
[8]. Wong, C. K., Gouda, M., & Lam, S. S. (2000). “Secure group communications using key graphs”. IEEE/ACM transactions on networking, 8(1), 16-30.
[9]. P.Shanthi Bala,” Intensification of Educational Cloud Computing and Crisis of Data Security in Public Clouds”,IJCSE Vol. 02, No. 03, 2010, 741-745.
[10]. Sajjan R.S.1*, Vijay Ghorpade2 and Vishvajit Dalimbkar3, “A Survey Paper on Data security in Cloud Computing”, Volume-4, Special Issue-4, June 2016 E-ISSN: 2347-2693.
[11]. Bellovin S. M. and Merritt M. 1992. “Encrypted key exchange Password-based protocols secure against dictionary attacks”. In Research in Security and Privacy. pp. 72-84.
[12]. 1F. Antony Xavier Bronson, S.P. Rajagopalan and ,V. Sai Shanmuga Raja, “A Dynamic Memory Allocation Strategy for Virtual Machines in Cloud Platform”, Volume 119 No. 15 2018, 1423-1444.
[13]. H. T. Dinh, C. Lee, D. Niyato, and P.Wang, “A survey of mobile cloud computing architecture, applications, and approaches”, Wireless communications and Mobile Computing, vol. 13, no. 18, pp. 1587–1611, 2013.
[14]. H. Qi and A. Gani, “Research on mobile cloud computing review, trend and perspective”, Digital Information and Communication Technology and its Applications (DICTAP), Bangkok, Thailand, 2012, pp.195–202.