Open Access   Article Go Back

Evaluating Synchronized Determination Assembly in Multi-Cloud Atmosphere

G.Malini 1 , A.Immaculate Mercy2

Section:Review Paper, Product Type: Journal Paper
Volume-3 , Issue-9 , Page no. 277-281, Sep-2015

Online published on Oct 01, 2015

Copyright © G.Malini , A.Immaculate Mercy . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: G.Malini , A.Immaculate Mercy , “Evaluating Synchronized Determination Assembly in Multi-Cloud Atmosphere,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.277-281, 2015.

MLA Style Citation: G.Malini , A.Immaculate Mercy "Evaluating Synchronized Determination Assembly in Multi-Cloud Atmosphere." International Journal of Computer Sciences and Engineering 3.9 (2015): 277-281.

APA Style Citation: G.Malini , A.Immaculate Mercy , (2015). Evaluating Synchronized Determination Assembly in Multi-Cloud Atmosphere. International Journal of Computer Sciences and Engineering, 3(9), 277-281.

BibTex Style Citation:
@article{Mercy_2015,
author = {G.Malini , A.Immaculate Mercy },
title = {Evaluating Synchronized Determination Assembly in Multi-Cloud Atmosphere},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2015},
volume = {3},
Issue = {9},
month = {9},
year = {2015},
issn = {2347-2693},
pages = {277-281},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=685},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=685
TI - Evaluating Synchronized Determination Assembly in Multi-Cloud Atmosphere
T2 - International Journal of Computer Sciences and Engineering
AU - G.Malini , A.Immaculate Mercy
PY - 2015
DA - 2015/10/01
PB - IJCSE, Indore, INDIA
SP - 277-281
IS - 9
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2284 2243 downloads 2358 downloads
  
  
           

Abstract

Cloud handling has emerged as a prominent paradigm that offers handling resources (e.g. CPU, storage, bandwidth, software) as scale capable also, on-demo, organizations over the Internet. As more players enter this rising market, a heterogeneous cloud handling market is anticipated to evolve, where individual players will have specific volumes of resources, also, will give specialized services, also, with specific levels of quality of services. It is anticipated that association suppliers will thus, besides competing, too collaborate to complement their resources in request to move forward asset use also, combine individual organizations to offer more complex esteem chains also, end-to-end arrangements required by the customers. In this paper we investigate the capacity of joint effort structure in cloud handling environments. This joint effort will be driven by the developing need to offer assorted organizations without having to spend heavily on infrastructure. Coordinated effort can be a boon to all cloud association suppliers in a way that the customers would have on offer a consolidated catalogue of all partnering CSPs.

Key-Words / Index Term

Cloud Computing, Cloud association provider(CSP), Proxy,SaaS, IaaS, PaaS

References

[1] Sang Jun Park ; Dept. of Comput. Sci., Indiana Univ.-Purdue Univ., Fort Wayne, IN, USA ; Jin Soung Yoo” Leveraging cloud computing for spatial association mining” Published in: Systems, Man and Cybernetics (SMC), 2014 IEEE International Conference on Date of Conference:5-8 Oct. 2014 Page(s):4152 – 4153.
[2] Wang Yong ; Dept. of Comput. Sci. & Eng., Guilin Univ. of Electron. Technol., Guilin, China ; Zhang Zhe ; Wang Fang” A parallel algorithm of association rules based on cloud computing” Published in:Communications and Networking in China (CHINACOM), 2013 8th International ICST Conference on Date of Conference:14-16 Aug. 2013 Page(s):415 – 419.
[3] Xueyan Huang ; Wireless Signal Process. & Network Lab., Beijing Univ. of Posts & Telecommun., Beijing, China ; Yong Li ; Gang Chuai ; Mugen Peng” Work in progress: Dynamic resource allocation and user association for heterogeneous cloud cellular networks” Published in:Communications and Networking in China (CHINACOM), 2014 9th International Conference on Date of Conference: 14-16 Aug. 2014Page(s):474 – 477.
[4] Zhao-hong Wang ; Dept. of Comput. Sci. & Technol., Weifang Univ., Weifang, China Quantitative Association Rules MiningMethod Based on Trapezium Cloud Model Published in: Database Technology and Applications (DBTA), 2010 2ndInternational Workshop on Date of Conference:27-28 Nov. 2010Page(s):1 – 4.
[5] Zhihui Zhou ; Coll. of Comput. Sci. & Technol., Jilin Univ., Changchun, China ; Guixia Liu ; Lingtao Su ; Lun Yan” CChi: An efficient cloud epistasis test model in human genome wide association studies” Published in: Biomedical Engineering and Informatics (BMEI), 2013 6th International Conference on Date of Conference:16-18 Dec. 2013Page(s):787 – 791.
[6] Sunitha, N.R. ; Dept. of Comput. Sci. &Eng., Siddaganga Inst. of Technol., Tumkur ; Amberker, B.B.” Forward-Secure Proxy Signature Scheme for Multiple Proxy Signers using DSA with Proxy Revocation” Published in:Advance Computing Conference, 2009. IACC 2009. IEEEInternational Date of Conference:6-7 March 2009Page(s):681 – 686.
[7] Jindan Zhang ; Dept. of Electron. Inf., Xianyang Vocational Tech. Coll., Xianyang ; Xu An Wang” Non-transitive Bidirectional Proxy Re-encryption Scheme” Published in: Networking and Digital Society, 2009. ICNDS '09. InternationalConference on (Volume:1 )Date of Conference: 30-31 May 2009 Page(s):213 – 216.
[8] Liu Wen-Yuan ; Yanshan Univ., Qinhuangdao ; Tong Feng ; Luo Yong-An ; Zhang Feng” A Proxy Blind Signature Scheme Based on Elliptic Curve with Proxy Revocation” Published in: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2007. SNPD 2007. Eighth ACIS International Conference on (Volume:1 )Date of Conference: July 30 2007-Aug.1 2007 Page(s):99 – 104.
[9] Iuon-Chang Lin ; Dept. of Manage. Inf. Syst., Nat. Chung Hsing Univ., Taichung ; Chin-Chen Chang ; Jen-Ho Yang” An Efficient Proxy Signature Scheme for Realizing Generalized Proxy Signing Policy” Published in: Intelligent Information Hiding and Multimedia Signal Processing, 2008. IIHMSP '08 International Conference on Date of Conference:15-17 Aug. 2008 Page(s):1537 – 1540.
[10] Fengying Li ; Dept. of Educ. Inf. Technol., East China Normal Univ., Shanghai, China ; Qingshui Xue ; Jiping Zhang ; Zhenfu Cao” About the security for HW threshold proxy signature scheme with self-certified public key system” Published in:Communications and Networking in China, 2009. ChinaCOM 2009. Fourth International Conference onDate of Conference:26-28 Aug. 2009Page(s):1 – 5
[11] Songqing Chen ; Dept. of Comput. Sci., Coll. of William & Mary, Williamsburg, VA ; Bo Shen ; Wee, S. ; Xiaodong Zhang” Designs of high quality streaming proxy systems” Published in: INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies (Volume:3 ) Date of Conference:7-11 March 2004 Page(s):1512 - 1521 vol.3
[12] Bu Sung Lee ; HP Labs. Singapore, Singapore, Singapore ; Shixing Yan ; Ding Ma ; Guopeng Zhao” Aggregating IaaS Service” Published in:SRII Global Conference (SRII), 2011 Annual Date of Conference:March 29 2011-April 2 2011 Page(s):335 – 338.