SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 10, Issue 2 (February 2014), PP. 16-21
16
Filling the consistency and reliability gap in elastic cloud – an
IaaS approach
N.G.S.Parameswaran1
, M.Sumathi2
1
Assistant Professor,Department of Computer Applications,VHNSN College,
(Autonomous) Virudhunagar, Tamilnadu, India
2
Associate Professor, Department of Computer science, Sri Meenakshi Govt.
Arts College for women, Madurai, Tamilnadu, India
Abstract:- The current Software, Platform and Infrastructure (SPI) architecture addresses the need for security.
This can be achieved by solving the issues with scalability. The performance measures of the cloud are also
addressed with the other two parameters like consistency and reliability. Few areas in cloud that need to be
addressed towards scalability are dynamic scaling and virtual system for sharing the resources. To address this,
the concept of elastic cloud is discussed in this paper with its performance measures using reliability and
consistency. The discussed model reflects on Amazon elastic model and SESA approach and in addition to this
the concept proposes virtualization along with optimized scaling.
Keywords:- IaaS, Cloud scalability, Consistency, Reliability, an IaaS approach
I. INTRODUCTION
The concept of scalable performance of the system used for building effective distributive system was
discussed in the recent years. This concept evolves in cloud and defined by its scalable services. Scalability was
adopted and handled in almost all the cloud architecture. Due to the dynamic nature of the cloud, the elasticity
prevails and results in system virtualization.
The enormous growth of the system and its data set addressed by the concept of distributed system and
while adoring it the upfront cost or the installation cost invested on it is maximum. To avoid such cost, the cloud
infrastructure comes with the proposal by which the set up cost is zero. The lack of integrity is another issue
arise in terms of distributed system especially when data is accessed any where beyond the boundary.
The IaaS approach in cloud focus on sharing infrastructure as a service by which the hardware or
system resources are shared with in an organization. To measure the scalable issues of cloud infrastructure, only
the desire need is accomplished by removing those services or resources which are not needed. The scalability
of the cloud is also calculated based on time factor in minutes or seconds to quench the desired services. The
optimum utilization of the cloud lies in sharing the resources, services in Just in Time (JIT).
In order to access any resource or service in cloud virtually, replication of the service prevails on
different zone with the same request. This is a challenging aspect in elastic cloud and it needs to be addressed.
Such accessing policy also leads to duplication of relevant data and services and occupy different storage
location nevertheless multiplies data storage capacity.
Fig 1: Cloud model in IaaS
Filling the consistency and reliability gap in elastic cloud – an IaaS approach
17
The Fig 1 defines a cloud as IaaS [3] where different users of various kinds (private, public etc...)[4]
were present in this scenario of approach. The security issue arises in the aspect of public cloud services
especially the tolerance level increases when the service gets duplicated on different location. The scalability
and consistency were measured in IaaS when all the system integrates into common phenomenon for accessing
unique services. In this approach the scalability and consistency deployed in terms of the system not by the IaaS
approach. The organization of this paper addresses the basic cloud IaaS model followed by literature review,
continued by explaining the proposed model dealing with model tradeoff and finally conclusion and future
work. Fig 1 projects basic cloud model for IaaS services.
II. EMPATHETIC CLOUD IAAS – A SURVEY
The concept of virtualization adhere is cloud IaaS basically uses virtual IP address of the system. Based
on the customer role they can utilize the cloud services. This concept in parallel supported with other cloud
services like SaaS and PaaS. When a requisition comes from a vital client, the designated virtual IP is assigned
to make use of the services which is a part evaluated by IaaS approach, on the other hand the system used for
accessing the service, served with the virtual IP and that provides unique services with the belief is that IP
address is unique. The concept of SaaS [1] in IaaS [2] provides designated services via the virtual IP along with
the components needed for accomplishing the task. The interface establish between the system and cloud server
that does the role of identifying exact services assigned for the IP in other words the system that holds the
virtual IP.
The PaaS in cloud services connects the services via a platform and that comes into role when the
services and Infrastructure are well established with the interface. Basic operation of PaaS works with system
tools with the percentage involvement of IaaS services into it as shown in Fig 2.
Fig 2: Cloud Services using IaaS and PaaS
Measuring the consistency and scalability of the system lies in the utilization of resources using IaaS
services [8]. The resource utilization in terms uses both the IaaS and PaaS services for all the systems to adhere
to the cloud services. Hence the betterment of the services lies in efficient usage of the system and its resources.
III. PROPOSED MODEL
The model identifies the core component for ensuring consistency within the system deployed to
thecloud server. While addressing the consistency measure of cloud services, it is measured using utility
computing. The scenario of utility resource computing in cloud services is explained in the Fig 3.The service
requisition and grant was done by cloud using utility processing. The utility processing identifies the system‟s
virtual id and if the system or the user is novel then the service is granted if not it will be revoked.
This process identifies the legitimate user and the system which has granted the virtual id. This process
is basic in novelty, but the issue prevails in the form of system consistency while using the resources in a
legitimate system.The core principle of cloud computing for providing effective services deals with the
following
1. Resource utilization
2. System virtualization
3. Elasticity
4. Service providers
5. Service invocation
A. RESOURCE UTILIZATION
This feature uses the basic cloud services like SaaS, PaaS, and IaaS. Depending on the system or user
request of availability, the services are either granted or accessed by the user.
PaaS
Virtual IP
&
S/w Appln
IaaS
Virtual IP
Data store
Filling the consistency and reliability gap in elastic cloud – an IaaS approach
18
B. SYSTEM VIRTUALIZATION
The systems were identified based on its location and the virtual IP assigned for accessing the cloud
services. Such feature paves way for „n‟ number of system accessing a same resource in an instance.The
prolonging service allocated to a system, will be either terminated or the accessing in progress depends on the
efficiency of the system. These concepts also address consistency and reliability for services to be made results
in either success or unsuccessful mode of allocation.
C. ELASTICITY
It is a key concept addressed in this paper for dealing with consistent, reliable usage of services. When
a new system request for a service to the cloud server, the cloud server allocates a virtual IP and provides the
service. As the request grows on depending on the number of system accessing or requesting the services, all the
system services were satisfied without affecting the performance of cloud server.
The effectiveness lies on the cloud server to make the services effective despite increasing the number of
system for accessing the services. In contrast if the system is accessing a resource of varying size, then the
complexity grows as this process is replicate on more number of systems.
In order to address this, the reliability measure is calculated for every system accessing a service from
the cloud server.
𝑹𝒊
𝒏
= 𝑼(𝒊, 𝒋)𝒓
𝒋=𝟎
𝒔
𝒊=𝟎
(1)
Where R is the reliability measure, i is the system identification, r is the resource access for each i of
system s, and U is the utility calculate for an individual system.Using the eqn (1) the reliability is measure and
the system is made available for accessing cloud services once the reliability is found perfect. For providing
effective solution towards services accessibility the consistency measure is also taken for consideration.
𝑪𝒊
𝒏
= 𝑼(𝒊, 𝒋)𝒓
𝒋=𝟎
𝒔
𝒊=𝟎
(2)
Now, the point is when is the system accessing cloud services is reliable and consistent, if it so then on
what measures. The performance evaluations of system accessing the services were calculated by combining the
reliable and consistent measure of the system during the process of service acquisition [9]. The time factor also
plays a major role for measuring the consistency measures. When a resource is been deployed to a system, the
system holds the resources until the access completes or based on few other factors that makes the services
inaccessible.
The reason for inaccessibleness may be of any reason, but the point makes clear whether is the services
are accessed or not. This key factor helps in measuring the reliability of the system accessing the resources. The
consistency is measured by, whenever there is a demand in the services; the access is granted at any cost. These
two factors are two different edges in cloud for accessing the services. The proposed work addresses these
issues by combining reliability and consistency factors and that provides efficient cloud services when the
service is extended beyond boundary (elastic cloud). The primary objective is to ensure reliable service even
when the service is accessed uttermost to the boundary.
Fig 3: Utility cloud services
Filling the consistency and reliability gap in elastic cloud – an IaaS approach
19
Fig 3 shows the cloud services deployed based on resource utilization. Here the boundary is fixed and
the systems positions are dynamic. The grant and revoke permission of the resource access done by service
utilization henceforth known to be utility server of the cloud. Irrespective of the system number the service is
granted and resources are shared among system. In this concept, all the cloud services (SaaS, PaaS, and IaaS)
adheres only the boundaries of the system location and provides the services within the boundary. The SaaS is
no longer extended in this case.
Fig 4 shows the cloud service extension using elastic cloud concept. In this scenario, the cloud services
were deployed beyond the service, for satisfying the system accessing the resources. The extension of SaaS is to
access the services to the designated location; the PaaS allocates the platform or hardware with software
application for performing accessing task within cloud services. The IaaS plays a vital role for deploying the
hardware and software component for extending the cloud services to the newly extended location without
affecting the cloud service performance by incorporating the result achieved in this work towards reliability and
consistency.
Fig 4: Elastic cloud services
When the cloud is deployed in elastic environment (Amazon EC2) it converts the Virtual IP into
Elastic virtual IP. The Elastic IP map the static IP into private, public or hybrid [5] IP based zone access. Such
classification will dictate the successful and unsuccessful service failure based on zonal classification.
Fig 5: Cloud stack with Scaling virtualization
Fig 5 shows the proposed cloud [6] stack with data scaling and virtualization. The understanding is that
all deployed virtual id possess the reliable and consistency measures in order to provide effective cloud services
Filling the consistency and reliability gap in elastic cloud – an IaaS approach
20
and migration services [7]. The score achieved in this work is deployed using Hyper-V which is a windows
virtualization server.
IV. RESULTS
The simulation result shows the reliability and consistency calculation in terms of the number of
systems and resources. The result projects the resource utilization and also measures the consistency of the
system performance. The proposed work is implemented by maximizing the access rate (consistency) by
gradually increasing the system and the resources to measure the utility rate. The achieved result projects
positive growth in utility rate by balancing both reliability and consistency. Such combination will increase the
scalable performance of the system as the number of system grows and the increase the utility demand. The
focus lies in the combination factor and result in maximum access rate even when the number of system is
increased.
Fig 6: Utilization reliabaility measures
Fig 7: Resource utilization and consistency measures
V. CONCLUSION AND FUTURE WORKS
This works addresses the combination factor of reliability and consistency for providing scalable
services. The result achieved shows the positive growth in reliable cloud services for accessing the resources.
The consistent performance was also addressing that to in elastic cloud services. The virtualization factor was
also addressed using virtual ip in elastic cloud. An extension of this work will address cloud watch with elastic
cloud that helps is monitoring cloud services after deploying in either private or public cloud.
Filling the consistency and reliability gap in elastic cloud – an IaaS approach
21
REFERENCES
[1]. GurudattKulkarni, Ramesh Sutar, JayantGambhir, “CLOUD COMPUTING-INFRASTRUCTURE AS
SERVICE- AMAZON EC2”, IJERA, Vol. 2, Issue 1, Jan-Feb 2012, pp.117-125
[2]. SushilBhardwaj, Leena Jain, Sandeep Jain, “Cloud computing: a study of Infrastructure as a service
(Iaas)”, IJEIT 2010, 2(1), pp 1-4.
[3]. Aniruddha S. Rumale, D.N.Chaudhari, “Cloud Computing: Infrastructure as a Service”, IJIES,
Volume-1, Issue-3, February 2013
[4]. Sukhpal Singh, InderveerChana, “Advance Billing and Metering Architecture for Infrastructure as a
Service”, IJ-CLOSER, Vol 2, No 2 (2013)
[5]. Sujay. R “Hybrid Cloud: A New Era, International Journal of Computer Science and Technology”,
ISSN: 2229-4333( Print) ISSN :0976 -8491 (Online), June 2011.
[6]. RupinderKaur, “Cloud computing, International Journal of Computer Science and Technology”, IJCST
Vol. 2, Issue 3, September 2011.
[7]. Ali Khajeh-Hosseiniet.al., “Cloud Migration: A Case Study of Migrating an Enterprise IT System to
IaaS”, IEEE 3rd International conference on Cloud Computing, 2010, 450-457.
[8]. SushilBhardwajet. al., “Cloud Computing: A Study of Infrastructure as a Service (IAAS)”,International
Journal of Engineering and Information Technology, 2010 waves publishers, IJEIT 2010, 2(1), 60-63.
[9]. S.Bharanisethupandian, Dr.M.Sumathi, “Design a Reliable Cloud computing strategy for efficient data
accessibility and resource sharing”, IJERD, Vol. 3, Issue 12, e-ISSN: 2278-067X, p-ISSN: 2278-800X

More Related Content

What's hot

A survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environmentA survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environmenteSAT Publishing House
 
IRJET- Optimization of Completion Time through Efficient Resource Allocation ...
IRJET- Optimization of Completion Time through Efficient Resource Allocation ...IRJET- Optimization of Completion Time through Efficient Resource Allocation ...
IRJET- Optimization of Completion Time through Efficient Resource Allocation ...IRJET Journal
 
Automated listening (1)
Automated listening (1)Automated listening (1)
Automated listening (1)ssuser6ff999
 
Hybrid Based Resource Provisioning in Cloud
Hybrid Based Resource Provisioning in CloudHybrid Based Resource Provisioning in Cloud
Hybrid Based Resource Provisioning in CloudEditor IJCATR
 
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTING
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTINGA SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTING
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTINGijccsa
 
Evaluating paas scalability and improving performance using scalability impro...
Evaluating paas scalability and improving performance using scalability impro...Evaluating paas scalability and improving performance using scalability impro...
Evaluating paas scalability and improving performance using scalability impro...eSAT Journals
 
Evaluating paas scalability and improving performance using scalability impro...
Evaluating paas scalability and improving performance using scalability impro...Evaluating paas scalability and improving performance using scalability impro...
Evaluating paas scalability and improving performance using scalability impro...eSAT Publishing House
 
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...1crore projects
 
Profit Driven Decision Assist System to Select Efficient IaaS Providers
Profit Driven Decision Assist System to Select Efficient  IaaS Providers Profit Driven Decision Assist System to Select Efficient  IaaS Providers
Profit Driven Decision Assist System to Select Efficient IaaS Providers IJECEIAES
 
2011 IaaS standards report from Ad Hoc WG
2011 IaaS standards report from Ad Hoc WG 2011 IaaS standards report from Ad Hoc WG
2011 IaaS standards report from Ad Hoc WG Bob Marcus
 

What's hot (14)

F1034047
F1034047F1034047
F1034047
 
A survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environmentA survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environment
 
IRJET- Optimization of Completion Time through Efficient Resource Allocation ...
IRJET- Optimization of Completion Time through Efficient Resource Allocation ...IRJET- Optimization of Completion Time through Efficient Resource Allocation ...
IRJET- Optimization of Completion Time through Efficient Resource Allocation ...
 
Automated listening (1)
Automated listening (1)Automated listening (1)
Automated listening (1)
 
Presentation
PresentationPresentation
Presentation
 
Hybrid Based Resource Provisioning in Cloud
Hybrid Based Resource Provisioning in CloudHybrid Based Resource Provisioning in Cloud
Hybrid Based Resource Provisioning in Cloud
 
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTING
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTINGA SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTING
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTING
 
Evaluating paas scalability and improving performance using scalability impro...
Evaluating paas scalability and improving performance using scalability impro...Evaluating paas scalability and improving performance using scalability impro...
Evaluating paas scalability and improving performance using scalability impro...
 
Evaluating paas scalability and improving performance using scalability impro...
Evaluating paas scalability and improving performance using scalability impro...Evaluating paas scalability and improving performance using scalability impro...
Evaluating paas scalability and improving performance using scalability impro...
 
Cs6703 grid and cloud computing unit 5
Cs6703 grid and cloud computing unit 5Cs6703 grid and cloud computing unit 5
Cs6703 grid and cloud computing unit 5
 
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...
 
E42053035
E42053035E42053035
E42053035
 
Profit Driven Decision Assist System to Select Efficient IaaS Providers
Profit Driven Decision Assist System to Select Efficient  IaaS Providers Profit Driven Decision Assist System to Select Efficient  IaaS Providers
Profit Driven Decision Assist System to Select Efficient IaaS Providers
 
2011 IaaS standards report from Ad Hoc WG
2011 IaaS standards report from Ad Hoc WG 2011 IaaS standards report from Ad Hoc WG
2011 IaaS standards report from Ad Hoc WG
 

Similar to International Journal of Engineering Research and Development

A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...Editor IJCATR
 
Combining efficiency, fidelity, and flexibility in resource information services
Combining efficiency, fidelity, and flexibility in resource information servicesCombining efficiency, fidelity, and flexibility in resource information services
Combining efficiency, fidelity, and flexibility in resource information servicesCloudTechnologies
 
IEEE 2015 - 2016 | Combining Efficiency, Fidelity, and Flexibility in Resource...
IEEE 2015 - 2016 | Combining Efficiency, Fidelity, and Flexibility in Resource...IEEE 2015 - 2016 | Combining Efficiency, Fidelity, and Flexibility in Resource...
IEEE 2015 - 2016 | Combining Efficiency, Fidelity, and Flexibility in Resource...1crore projects
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
PROPOSED ONTOLOGY FRAMEWORK FOR DYNAMIC RESOURCE PROVISIONING ON PUBLIC CLOUD
PROPOSED ONTOLOGY FRAMEWORK FOR DYNAMIC RESOURCE PROVISIONING ON PUBLIC CLOUDPROPOSED ONTOLOGY FRAMEWORK FOR DYNAMIC RESOURCE PROVISIONING ON PUBLIC CLOUD
PROPOSED ONTOLOGY FRAMEWORK FOR DYNAMIC RESOURCE PROVISIONING ON PUBLIC CLOUDIAEME Publication
 
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...Dr. Richard Otieno
 
cloude_ term paper_presentation (4).pptx
cloude_ term paper_presentation (4).pptxcloude_ term paper_presentation (4).pptx
cloude_ term paper_presentation (4).pptxbemniman2
 
.Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com .Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com msudan92
 
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...ASAITHAMBIRAJAA
 
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...ASAITHAMBIRAJAA
 
Cloud Computing: Provide privacy and Security in Database-as-a-Service
Cloud Computing: Provide privacy and Security in Database-as-a-ServiceCloud Computing: Provide privacy and Security in Database-as-a-Service
Cloud Computing: Provide privacy and Security in Database-as-a-ServiceEditor Jacotech
 
Multi-objective load balancing in cloud infrastructure through fuzzy based de...
Multi-objective load balancing in cloud infrastructure through fuzzy based de...Multi-objective load balancing in cloud infrastructure through fuzzy based de...
Multi-objective load balancing in cloud infrastructure through fuzzy based de...IAESIJAI
 
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTING
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTINGA SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTING
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTINGijccsa
 
A Survey on Resource Allocation in Cloud Computing
A Survey on Resource Allocation in Cloud ComputingA Survey on Resource Allocation in Cloud Computing
A Survey on Resource Allocation in Cloud Computingneirew J
 
An Efficient Queuing Model for Resource Sharing in Cloud Computing
	An Efficient Queuing Model for Resource Sharing in Cloud Computing	An Efficient Queuing Model for Resource Sharing in Cloud Computing
An Efficient Queuing Model for Resource Sharing in Cloud Computingtheijes
 

Similar to International Journal of Engineering Research and Development (20)

A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
 
Combining efficiency, fidelity, and flexibility in resource information services
Combining efficiency, fidelity, and flexibility in resource information servicesCombining efficiency, fidelity, and flexibility in resource information services
Combining efficiency, fidelity, and flexibility in resource information services
 
IEEE 2015 - 2016 | Combining Efficiency, Fidelity, and Flexibility in Resource...
IEEE 2015 - 2016 | Combining Efficiency, Fidelity, and Flexibility in Resource...IEEE 2015 - 2016 | Combining Efficiency, Fidelity, and Flexibility in Resource...
IEEE 2015 - 2016 | Combining Efficiency, Fidelity, and Flexibility in Resource...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
B03410609
B03410609B03410609
B03410609
 
PROPOSED ONTOLOGY FRAMEWORK FOR DYNAMIC RESOURCE PROVISIONING ON PUBLIC CLOUD
PROPOSED ONTOLOGY FRAMEWORK FOR DYNAMIC RESOURCE PROVISIONING ON PUBLIC CLOUDPROPOSED ONTOLOGY FRAMEWORK FOR DYNAMIC RESOURCE PROVISIONING ON PUBLIC CLOUD
PROPOSED ONTOLOGY FRAMEWORK FOR DYNAMIC RESOURCE PROVISIONING ON PUBLIC CLOUD
 
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
 
cloude_ term paper_presentation (4).pptx
cloude_ term paper_presentation (4).pptxcloude_ term paper_presentation (4).pptx
cloude_ term paper_presentation (4).pptx
 
.Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com .Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com
 
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
 
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
 
Cloud Computing: Provide privacy and Security in Database-as-a-Service
Cloud Computing: Provide privacy and Security in Database-as-a-ServiceCloud Computing: Provide privacy and Security in Database-as-a-Service
Cloud Computing: Provide privacy and Security in Database-as-a-Service
 
1376842823 2982373
1376842823  29823731376842823  2982373
1376842823 2982373
 
1376842823 2982373
1376842823  29823731376842823  2982373
1376842823 2982373
 
Multi-objective load balancing in cloud infrastructure through fuzzy based de...
Multi-objective load balancing in cloud infrastructure through fuzzy based de...Multi-objective load balancing in cloud infrastructure through fuzzy based de...
Multi-objective load balancing in cloud infrastructure through fuzzy based de...
 
G216063
G216063G216063
G216063
 
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTING
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTINGA SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTING
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTING
 
A Survey on Resource Allocation in Cloud Computing
A Survey on Resource Allocation in Cloud ComputingA Survey on Resource Allocation in Cloud Computing
A Survey on Resource Allocation in Cloud Computing
 
G017553540
G017553540G017553540
G017553540
 
An Efficient Queuing Model for Resource Sharing in Cloud Computing
	An Efficient Queuing Model for Resource Sharing in Cloud Computing	An Efficient Queuing Model for Resource Sharing in Cloud Computing
An Efficient Queuing Model for Resource Sharing in Cloud Computing
 

More from IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

More from IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Recently uploaded

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

International Journal of Engineering Research and Development

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 10, Issue 2 (February 2014), PP. 16-21 16 Filling the consistency and reliability gap in elastic cloud – an IaaS approach N.G.S.Parameswaran1 , M.Sumathi2 1 Assistant Professor,Department of Computer Applications,VHNSN College, (Autonomous) Virudhunagar, Tamilnadu, India 2 Associate Professor, Department of Computer science, Sri Meenakshi Govt. Arts College for women, Madurai, Tamilnadu, India Abstract:- The current Software, Platform and Infrastructure (SPI) architecture addresses the need for security. This can be achieved by solving the issues with scalability. The performance measures of the cloud are also addressed with the other two parameters like consistency and reliability. Few areas in cloud that need to be addressed towards scalability are dynamic scaling and virtual system for sharing the resources. To address this, the concept of elastic cloud is discussed in this paper with its performance measures using reliability and consistency. The discussed model reflects on Amazon elastic model and SESA approach and in addition to this the concept proposes virtualization along with optimized scaling. Keywords:- IaaS, Cloud scalability, Consistency, Reliability, an IaaS approach I. INTRODUCTION The concept of scalable performance of the system used for building effective distributive system was discussed in the recent years. This concept evolves in cloud and defined by its scalable services. Scalability was adopted and handled in almost all the cloud architecture. Due to the dynamic nature of the cloud, the elasticity prevails and results in system virtualization. The enormous growth of the system and its data set addressed by the concept of distributed system and while adoring it the upfront cost or the installation cost invested on it is maximum. To avoid such cost, the cloud infrastructure comes with the proposal by which the set up cost is zero. The lack of integrity is another issue arise in terms of distributed system especially when data is accessed any where beyond the boundary. The IaaS approach in cloud focus on sharing infrastructure as a service by which the hardware or system resources are shared with in an organization. To measure the scalable issues of cloud infrastructure, only the desire need is accomplished by removing those services or resources which are not needed. The scalability of the cloud is also calculated based on time factor in minutes or seconds to quench the desired services. The optimum utilization of the cloud lies in sharing the resources, services in Just in Time (JIT). In order to access any resource or service in cloud virtually, replication of the service prevails on different zone with the same request. This is a challenging aspect in elastic cloud and it needs to be addressed. Such accessing policy also leads to duplication of relevant data and services and occupy different storage location nevertheless multiplies data storage capacity. Fig 1: Cloud model in IaaS
  • 2. Filling the consistency and reliability gap in elastic cloud – an IaaS approach 17 The Fig 1 defines a cloud as IaaS [3] where different users of various kinds (private, public etc...)[4] were present in this scenario of approach. The security issue arises in the aspect of public cloud services especially the tolerance level increases when the service gets duplicated on different location. The scalability and consistency were measured in IaaS when all the system integrates into common phenomenon for accessing unique services. In this approach the scalability and consistency deployed in terms of the system not by the IaaS approach. The organization of this paper addresses the basic cloud IaaS model followed by literature review, continued by explaining the proposed model dealing with model tradeoff and finally conclusion and future work. Fig 1 projects basic cloud model for IaaS services. II. EMPATHETIC CLOUD IAAS – A SURVEY The concept of virtualization adhere is cloud IaaS basically uses virtual IP address of the system. Based on the customer role they can utilize the cloud services. This concept in parallel supported with other cloud services like SaaS and PaaS. When a requisition comes from a vital client, the designated virtual IP is assigned to make use of the services which is a part evaluated by IaaS approach, on the other hand the system used for accessing the service, served with the virtual IP and that provides unique services with the belief is that IP address is unique. The concept of SaaS [1] in IaaS [2] provides designated services via the virtual IP along with the components needed for accomplishing the task. The interface establish between the system and cloud server that does the role of identifying exact services assigned for the IP in other words the system that holds the virtual IP. The PaaS in cloud services connects the services via a platform and that comes into role when the services and Infrastructure are well established with the interface. Basic operation of PaaS works with system tools with the percentage involvement of IaaS services into it as shown in Fig 2. Fig 2: Cloud Services using IaaS and PaaS Measuring the consistency and scalability of the system lies in the utilization of resources using IaaS services [8]. The resource utilization in terms uses both the IaaS and PaaS services for all the systems to adhere to the cloud services. Hence the betterment of the services lies in efficient usage of the system and its resources. III. PROPOSED MODEL The model identifies the core component for ensuring consistency within the system deployed to thecloud server. While addressing the consistency measure of cloud services, it is measured using utility computing. The scenario of utility resource computing in cloud services is explained in the Fig 3.The service requisition and grant was done by cloud using utility processing. The utility processing identifies the system‟s virtual id and if the system or the user is novel then the service is granted if not it will be revoked. This process identifies the legitimate user and the system which has granted the virtual id. This process is basic in novelty, but the issue prevails in the form of system consistency while using the resources in a legitimate system.The core principle of cloud computing for providing effective services deals with the following 1. Resource utilization 2. System virtualization 3. Elasticity 4. Service providers 5. Service invocation A. RESOURCE UTILIZATION This feature uses the basic cloud services like SaaS, PaaS, and IaaS. Depending on the system or user request of availability, the services are either granted or accessed by the user. PaaS Virtual IP & S/w Appln IaaS Virtual IP Data store
  • 3. Filling the consistency and reliability gap in elastic cloud – an IaaS approach 18 B. SYSTEM VIRTUALIZATION The systems were identified based on its location and the virtual IP assigned for accessing the cloud services. Such feature paves way for „n‟ number of system accessing a same resource in an instance.The prolonging service allocated to a system, will be either terminated or the accessing in progress depends on the efficiency of the system. These concepts also address consistency and reliability for services to be made results in either success or unsuccessful mode of allocation. C. ELASTICITY It is a key concept addressed in this paper for dealing with consistent, reliable usage of services. When a new system request for a service to the cloud server, the cloud server allocates a virtual IP and provides the service. As the request grows on depending on the number of system accessing or requesting the services, all the system services were satisfied without affecting the performance of cloud server. The effectiveness lies on the cloud server to make the services effective despite increasing the number of system for accessing the services. In contrast if the system is accessing a resource of varying size, then the complexity grows as this process is replicate on more number of systems. In order to address this, the reliability measure is calculated for every system accessing a service from the cloud server. 𝑹𝒊 𝒏 = 𝑼(𝒊, 𝒋)𝒓 𝒋=𝟎 𝒔 𝒊=𝟎 (1) Where R is the reliability measure, i is the system identification, r is the resource access for each i of system s, and U is the utility calculate for an individual system.Using the eqn (1) the reliability is measure and the system is made available for accessing cloud services once the reliability is found perfect. For providing effective solution towards services accessibility the consistency measure is also taken for consideration. 𝑪𝒊 𝒏 = 𝑼(𝒊, 𝒋)𝒓 𝒋=𝟎 𝒔 𝒊=𝟎 (2) Now, the point is when is the system accessing cloud services is reliable and consistent, if it so then on what measures. The performance evaluations of system accessing the services were calculated by combining the reliable and consistent measure of the system during the process of service acquisition [9]. The time factor also plays a major role for measuring the consistency measures. When a resource is been deployed to a system, the system holds the resources until the access completes or based on few other factors that makes the services inaccessible. The reason for inaccessibleness may be of any reason, but the point makes clear whether is the services are accessed or not. This key factor helps in measuring the reliability of the system accessing the resources. The consistency is measured by, whenever there is a demand in the services; the access is granted at any cost. These two factors are two different edges in cloud for accessing the services. The proposed work addresses these issues by combining reliability and consistency factors and that provides efficient cloud services when the service is extended beyond boundary (elastic cloud). The primary objective is to ensure reliable service even when the service is accessed uttermost to the boundary. Fig 3: Utility cloud services
  • 4. Filling the consistency and reliability gap in elastic cloud – an IaaS approach 19 Fig 3 shows the cloud services deployed based on resource utilization. Here the boundary is fixed and the systems positions are dynamic. The grant and revoke permission of the resource access done by service utilization henceforth known to be utility server of the cloud. Irrespective of the system number the service is granted and resources are shared among system. In this concept, all the cloud services (SaaS, PaaS, and IaaS) adheres only the boundaries of the system location and provides the services within the boundary. The SaaS is no longer extended in this case. Fig 4 shows the cloud service extension using elastic cloud concept. In this scenario, the cloud services were deployed beyond the service, for satisfying the system accessing the resources. The extension of SaaS is to access the services to the designated location; the PaaS allocates the platform or hardware with software application for performing accessing task within cloud services. The IaaS plays a vital role for deploying the hardware and software component for extending the cloud services to the newly extended location without affecting the cloud service performance by incorporating the result achieved in this work towards reliability and consistency. Fig 4: Elastic cloud services When the cloud is deployed in elastic environment (Amazon EC2) it converts the Virtual IP into Elastic virtual IP. The Elastic IP map the static IP into private, public or hybrid [5] IP based zone access. Such classification will dictate the successful and unsuccessful service failure based on zonal classification. Fig 5: Cloud stack with Scaling virtualization Fig 5 shows the proposed cloud [6] stack with data scaling and virtualization. The understanding is that all deployed virtual id possess the reliable and consistency measures in order to provide effective cloud services
  • 5. Filling the consistency and reliability gap in elastic cloud – an IaaS approach 20 and migration services [7]. The score achieved in this work is deployed using Hyper-V which is a windows virtualization server. IV. RESULTS The simulation result shows the reliability and consistency calculation in terms of the number of systems and resources. The result projects the resource utilization and also measures the consistency of the system performance. The proposed work is implemented by maximizing the access rate (consistency) by gradually increasing the system and the resources to measure the utility rate. The achieved result projects positive growth in utility rate by balancing both reliability and consistency. Such combination will increase the scalable performance of the system as the number of system grows and the increase the utility demand. The focus lies in the combination factor and result in maximum access rate even when the number of system is increased. Fig 6: Utilization reliabaility measures Fig 7: Resource utilization and consistency measures V. CONCLUSION AND FUTURE WORKS This works addresses the combination factor of reliability and consistency for providing scalable services. The result achieved shows the positive growth in reliable cloud services for accessing the resources. The consistent performance was also addressing that to in elastic cloud services. The virtualization factor was also addressed using virtual ip in elastic cloud. An extension of this work will address cloud watch with elastic cloud that helps is monitoring cloud services after deploying in either private or public cloud.
  • 6. Filling the consistency and reliability gap in elastic cloud – an IaaS approach 21 REFERENCES [1]. GurudattKulkarni, Ramesh Sutar, JayantGambhir, “CLOUD COMPUTING-INFRASTRUCTURE AS SERVICE- AMAZON EC2”, IJERA, Vol. 2, Issue 1, Jan-Feb 2012, pp.117-125 [2]. SushilBhardwaj, Leena Jain, Sandeep Jain, “Cloud computing: a study of Infrastructure as a service (Iaas)”, IJEIT 2010, 2(1), pp 1-4. [3]. Aniruddha S. Rumale, D.N.Chaudhari, “Cloud Computing: Infrastructure as a Service”, IJIES, Volume-1, Issue-3, February 2013 [4]. Sukhpal Singh, InderveerChana, “Advance Billing and Metering Architecture for Infrastructure as a Service”, IJ-CLOSER, Vol 2, No 2 (2013) [5]. Sujay. R “Hybrid Cloud: A New Era, International Journal of Computer Science and Technology”, ISSN: 2229-4333( Print) ISSN :0976 -8491 (Online), June 2011. [6]. RupinderKaur, “Cloud computing, International Journal of Computer Science and Technology”, IJCST Vol. 2, Issue 3, September 2011. [7]. Ali Khajeh-Hosseiniet.al., “Cloud Migration: A Case Study of Migrating an Enterprise IT System to IaaS”, IEEE 3rd International conference on Cloud Computing, 2010, 450-457. [8]. SushilBhardwajet. al., “Cloud Computing: A Study of Infrastructure as a Service (IAAS)”,International Journal of Engineering and Information Technology, 2010 waves publishers, IJEIT 2010, 2(1), 60-63. [9]. S.Bharanisethupandian, Dr.M.Sumathi, “Design a Reliable Cloud computing strategy for efficient data accessibility and resource sharing”, IJERD, Vol. 3, Issue 12, e-ISSN: 2278-067X, p-ISSN: 2278-800X