Open Access   Article Go Back

A Model for Cloud Computing for Emergency Operation

Shital Bedse1 , Pratiksha Ahire2 , Prerna Dhondge3 , Harshali Kunde4 , Sarika Bhagwat5

  1. Department of Information Technology, Sandip Institute of Technology and Research Center, Nashik, India.
  2. Department of Information Technology, Sandip Institute of Technology and Research Center, Nashik, India.
  3. Department of Information Technology, Sandip Institute of Technology and Research Center, Nashik, India.
  4. Department of Information Technology, Sandip Institute of Technology and Research Center, Nashik, India.
  5. Department of Information Technology, Sandip Institute of Technology and Research Ce.

Section:Research Paper, Product Type: Journal Paper
Volume-8 , Issue-4 , Page no. 75-79, Apr-2020

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v8i4.7579

Online published on Apr 30, 2020

Copyright © Shital Bedse, Pratiksha Ahire, Prerna Dhondge, Harshali Kunde, Sarika Bhagwat . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Shital Bedse, Pratiksha Ahire, Prerna Dhondge, Harshali Kunde, Sarika Bhagwat, “A Model for Cloud Computing for Emergency Operation,” International Journal of Computer Sciences and Engineering, Vol.8, Issue.4, pp.75-79, 2020.

MLA Style Citation: Shital Bedse, Pratiksha Ahire, Prerna Dhondge, Harshali Kunde, Sarika Bhagwat "A Model for Cloud Computing for Emergency Operation." International Journal of Computer Sciences and Engineering 8.4 (2020): 75-79.

APA Style Citation: Shital Bedse, Pratiksha Ahire, Prerna Dhondge, Harshali Kunde, Sarika Bhagwat, (2020). A Model for Cloud Computing for Emergency Operation. International Journal of Computer Sciences and Engineering, 8(4), 75-79.

BibTex Style Citation:
@article{Bedse_2020,
author = {Shital Bedse, Pratiksha Ahire, Prerna Dhondge, Harshali Kunde, Sarika Bhagwat},
title = {A Model for Cloud Computing for Emergency Operation},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2020},
volume = {8},
Issue = {4},
month = {4},
year = {2020},
issn = {2347-2693},
pages = {75-79},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5078},
doi = {https://doi.org/10.26438/ijcse/v8i4.7579}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v8i4.7579}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5078
TI - A Model for Cloud Computing for Emergency Operation
T2 - International Journal of Computer Sciences and Engineering
AU - Shital Bedse, Pratiksha Ahire, Prerna Dhondge, Harshali Kunde, Sarika Bhagwat
PY - 2020
DA - 2020/04/30
PB - IJCSE, Indore, INDIA
SP - 75-79
IS - 4
VL - 8
SN - 2347-2693
ER -

VIEWS PDF XML
300 305 downloads 178 downloads
  
  
           

Abstract

Cloud computing enables on demand network access to a share pool of configurable computing resources such as servers, storage and application. Cloud storage used to deliver the storage resources to the user over the Internet. Private cloud storage is restricted to a specific organization and data security risks are high in cloud storage. Hence, private cloud storage is built by utilizing the commodity machines within the organization and the important data is stored in it. When the utilization of such private cloud storage increases there will be an increase in the connection problem, performance, storage demand, privacy, security and data integrity. For connection problem we will implement offline data store and sync mechanism. Increase in storage demand leads to the enlargement of the cloud storage with additional storage nodes. During such enlargement, storage nodes in the cloud storage need to be balanced in terms of load. The key idea behind this is to develop a dynamic load balancing algorithm based on de-duplication to balance the load across the storage nodes during the expansion of private cloud storage. For maintaining privacy, security and data integrity we will use AES algorithm and SHA algorithm.

Key-Words / Index Term

Cloud computing, Reliablity, Load balancing, Encryption, Secure De-duplication, Data integrity

References

[1] Abdelfatah A Tamimi, Raneem Dawood, Lana Sadaqa, “Disaster Recovery Techniques in Cloud Computing”, IEEE Jordan International Joint Conference on Electrical and Information Technology (JEEIT), pp.845-850, 2019.
[2] Savani Nirav M, Prof. Amar Buchade, “Priority Based Dynamic Resource Allocation in Cloud Computing”, International Journal of Engineering Research and Technology (IJERT), Vol.3, Issue.5, 2014.
[3] Pooja Y. Bansode, Payal A. Lokhande, Siddhant Sawant, Prof.R.B.Nangare, “A Survey on: Load Balancing and De-Duplication in Cloud Computing”, International Journal of Advance Research and Innovative ideas in Education (IJARIIE), Vol.3, Issue.2, 2017.
[4] J.M. Nandhini, T.Gnanasekaran, “Fault Tolerance using Adaptive Checkpoint in Cloud- An Approch”, International Journal of Computer Application, Vol.175, No.6, 2017.
[5] Rajkumar Buyya, Chee Shin yeo, Srikumar Venugopal, “Market-Oriented Cloud Computing: Vision, Hype, and Reality for delivering IT services as Computing Utilities”, IEEE International Conference on High Performance Computing and Communication, 2008.
[6] Sandip Sharma, Sarabjit Singh, Meenakshi Sharma, “Performance analysis of Load Balancing Algorithms”, World Academy of Sciences, Engineering and technology, pp.269-272, 2008.
[7] Poonam R Maskare, Sarika R Sulke, “Review paper on E-learning using Cloud Computing”, International Journal of Computer Science and Mobile Computing, Vol.3, Issue.5, pp.1281-1287, 2014.
[8] Manahel Omar Hussen, Nirmla Sharma, Hosam F. EL-Sofany, “A Novel Model for Securing access of Cloud Based E-Learning Systems”, International Journal of Engineering and applied Sciences and technology, Vol.4, Issue.7, pp.1-9, 2019.
[9] Nidhi Jain Kansal, Inderveer Chana, “Existing Load Balancing techniques in Cloud Computing: A Systematic”, Journal of Information Systems and Communication, Vol.3, Issue.1, pp.87-91, 2012.
[10] Aameek Singh, Madhukar Korupolu, Dushmanta Mohapatra, “Server-storage virtualization: Integration and load balancing in data centers”, ACM/IEEE conference on Supercomputing, pp.15-21, 2008.
[11] Rade Stanojevic, Robert Shorten, “Load Balancing vs. Distributed Rate Limiting: An Unifying Framework for Cloud Control”, IEEE ICC, pp.1-6, 2009.
[12] Yi Zhao, Wenlong Huang, “Adaptive Distributed Load Balancing Algorithm Based on Live Migration of Virtual Machines in Cloud”, IEEE 5th International Joint Conference on INC, IMS and IDC, pp.170-175 , 2009.
[13] Nae V., Prodan R. and Fahringer T, “Load Balancing Techniques in Cloud Computing: A Study”, 11th IEEE/ACM International Conference on Grid Computing, pp.9-17, 2010 .
[14] Jinhua Hu, Jianhua Gu, Guofei sun, Tianhai Zhao, “A Scheduling strategy on load balancing of virtual machine resource in cloud computing environment”, 3rd International Symposium on Parallel Architectures, Algorithms and Programming, pp.89-96, 2010.
[15] Abhay Bhadani, Sanjay Chaudhary, “Performance evaluation of web Servers using Central load balancing policy over virtual machines on cloud”, 3rd Annual ACM Bangalore Conference, 2010.
[16] Jiyi WU , Lingdi PING, Xiaoping GE, Ya Wang, Jianqing FU, “Cloud storage as the infrastructure of cloud computing”, International Conference on Intelligent Computing and Cognitive Informatics, KualaLumpur, pp.380- 383, 2010.
[17] Chandrashekhar S. Pawar, Rajnikant B. Wagh, “Priority Based Dynamic Resource Allocation in Cloud Computing with Modified Waiting Queue”, International Conference on Intelligent Systems and Signal Processing (ISSP), pp.311-316, 2013.
[18] Rui Hu, Yong Li, Yan Zhang, “Adaptive Resource Management in PaaS Platform Using Feedback Control LRU Algorithm”, International Conference on Cloud and Service Computing, pp.11-18, 2011.
[19] Ghalem Belalem and Said Limam, “Fault Tolerant Architecture to Cloud Computing using Adaptive Checkpoint”, International Journal of Cloud Applications and Computing, pp.60-69, 2011.