In Current trends the Cloud computing has a lot of potential to help hospitals cut costs, a new report says. Here‟s some help overcoming some of the challenges hiding in the cloud. Previously there several methods are available for this like Broker based trust architecture and etc. Health care framework which are patient, doctor, symptom and disease. In this paper we are going to discuss the broker based architecture for federated cloud and its Service Measurement Index considered for evaluating the providers,construction of Grade Distribution Table(GDT),concept of ranking the providers based on prediction weights comparison, optimal service provider selection and results discussion compared with existing techniques available for ranking the providers. In this paper we are going to propose, two different ranking mechanisms to sort the providers and select the optimal provider automatically. Grade distribution ranking model is proposed by assigning the grade for the providers based on the values of SMI attributes, based on the total grade value, providers falls on either Gold, Silver or Bronze. Each category applies the quick sort to sort the providers and find the provider at the top is optimal. If there is more than one provider at the top, apply priority feedback based decision tree and find the optimal provider for the request. In the second ranking mechanism, joint probability distribution mechanism is used to rank the providers, two providers having same score, apply priority feedback based decision tree and find the optimal provider for the request.
Cloud Trust Management Framework Based On Cloud Market spacesIJERA Editor
Nowadays, applications running in virtual or cloud-based environments are all susceptible to exploitation. However, traditional trust solutions have not been fully optimized for virtualized third party environments. In this situation, the selection of an appropriate cloud service provider is an issue. This paper introduces a completely novel idea on most appropriate cloud service selection through an intermediator. It is based on the new notion of a marketspace. Our paper is devoted to the investigation of a novel architecture suggested for a marketspace. Several theoretical notions related to trust have also been explained extensively in the paper for Cloud service provider selection.
Profit Driven Decision Assist System to Select Efficient IaaS Providers IJECEIAES
IaaS providers provide infrastructure to the end users with various pricing schemes and models. They provide different types of virtual machines (small, medium, large, etc.). Since each IaaS provider uses their own pricing schemes and models, price varies from one provider to the other for the same requirements. To select a best IaaS provider, the end users need to consider various parameters such as SLA, pricing models/schemes, VM heterogeneity, etc. Since many parameters are involved, selecting an efficient IaaS provider is a challenging job for an end user. To address this issue, in this work we have designed, implemented and tested a decision-assist system which assists the end users to select efficient IaaS provider(s). Our decision-assist system consists of an analytical model to calculate the cost and decision strategies to assist the end user in selecting the efficient IaaS provider(s). The decision assist system considers various relevant parameters such as VM configuration, price, availability, etc. to decide the efficient IaaS provider(s). Rigorous experiments have been conducted by emulating various IaaS providers, and we have observed that our DAS successfully suggests the efficient IaaS provider/ providers by considering the input parameters given by the user.
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) ijccsa
IT Companies have shifted their resources to the cloud at rapidly increasing rate. As part of this trend companies are migrating business critical and sensitive data stored in database to cloud-hosted and Database as a Service (DBaaS) solutions.Of all that has been written about cloud computing, precious little attention has been paid to authentication in the cloud. In this paper we have designed a new effective authentication scheme for Cloud Database as a Service (DBaaS). A user can change his/her password, whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed model for DBaaS and achieves efficiency. We also proposed an efficient authentication scheme to solve the authentication problem in cloud. The proposed solution which we have provided is based mainly on improved Needham-Schroeder’s protocol to prove the users’ identity to determine if this user is authorized or not. The results showed that this scheme is very strong and difficult to break it.
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Cloud Trust Management Framework Based On Cloud Market spacesIJERA Editor
Nowadays, applications running in virtual or cloud-based environments are all susceptible to exploitation. However, traditional trust solutions have not been fully optimized for virtualized third party environments. In this situation, the selection of an appropriate cloud service provider is an issue. This paper introduces a completely novel idea on most appropriate cloud service selection through an intermediator. It is based on the new notion of a marketspace. Our paper is devoted to the investigation of a novel architecture suggested for a marketspace. Several theoretical notions related to trust have also been explained extensively in the paper for Cloud service provider selection.
Profit Driven Decision Assist System to Select Efficient IaaS Providers IJECEIAES
IaaS providers provide infrastructure to the end users with various pricing schemes and models. They provide different types of virtual machines (small, medium, large, etc.). Since each IaaS provider uses their own pricing schemes and models, price varies from one provider to the other for the same requirements. To select a best IaaS provider, the end users need to consider various parameters such as SLA, pricing models/schemes, VM heterogeneity, etc. Since many parameters are involved, selecting an efficient IaaS provider is a challenging job for an end user. To address this issue, in this work we have designed, implemented and tested a decision-assist system which assists the end users to select efficient IaaS provider(s). Our decision-assist system consists of an analytical model to calculate the cost and decision strategies to assist the end user in selecting the efficient IaaS provider(s). The decision assist system considers various relevant parameters such as VM configuration, price, availability, etc. to decide the efficient IaaS provider(s). Rigorous experiments have been conducted by emulating various IaaS providers, and we have observed that our DAS successfully suggests the efficient IaaS provider/ providers by considering the input parameters given by the user.
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) ijccsa
IT Companies have shifted their resources to the cloud at rapidly increasing rate. As part of this trend companies are migrating business critical and sensitive data stored in database to cloud-hosted and Database as a Service (DBaaS) solutions.Of all that has been written about cloud computing, precious little attention has been paid to authentication in the cloud. In this paper we have designed a new effective authentication scheme for Cloud Database as a Service (DBaaS). A user can change his/her password, whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed model for DBaaS and achieves efficiency. We also proposed an efficient authentication scheme to solve the authentication problem in cloud. The proposed solution which we have provided is based mainly on improved Needham-Schroeder’s protocol to prove the users’ identity to determine if this user is authorized or not. The results showed that this scheme is very strong and difficult to break it.
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
DESIGNING ASPECT AND FUNCTIONALITY ISSUES OF CLOUD BROKERING SERVICE IN CLOUD...Souvik Pal
Cloud brokering service is an intermediate service which enables the producer-consumer business model
enforcing the easy access to cloud services from Cloud Service Providers (CSPs). Cloud broker is to
provide a platform where broker collects the information from the user, analyze the data, and sends those
data to the CSPs. Cloud broker also provides data integration services and modeling the data across all the
components or units of the cloud services. This paper deals with designing criteria and issues of cloud
broker, system activity of broker, and sequence diagram of system design with implementation procedure.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONINGIJCNCJournal
As cloud computing is increasingly transforming the information technology landscape, organizations and
businesses are exhibiting strong interest in Software-as-a-Service (SaaS) offerings that can help them
increase business agility and reduce their operational costs. They increasingly demand services that can
meet their functional and non-functional requirements. Given the plethora and the variety of SaaS
offerings, we propose, in this paper, a framework for SaaS provisioning, which relies on brokered Service
Level agreements (SLAs), between service consumers and SaaS providers. The Cloud Service Broker (CSB)
helps service consumers find the right SaaS providers that can fulfil their functional and non-functional
requirements. The proposed selection algorithm ranks potential SaaS providers by matching their offerings
against the requirements of the service consumer using an aggregate utility function. Furthermore, the CSB
is in charge of conducting SLA negotiation with selected SaaS providers, on behalf of service consumers,
and performing SLA compliance monitoring
MMB Cloud-Tree: Verifiable Cloud Service SelectionIJAEMSJORNAL
In the existing cloud brokerage system, the client does not have the ability to verify the result of the cloud service selection. There are possibilities that the cloud broker can be biased in selecting the best Cloud Service Provider (CSP) for a client. A compromised or dishonest cloud broker can unfairly select a CSP for its own advantage by cooperating with the selected CSP. To address this problem, we propose a mechanism to verify the CSP selection result of the cloud broker. In this verification mechanism, properties of every CSP will also be verified. It uses a trusted third party to gather clustering result from the cloud broker. This trusted third party is also used as a base station to collect CSP properties in a multi-agent’s system. Software Agents are installed and running on every CSP. The CSP is monitored by agents as the representative of the customer inside the cloud. These multi-agents give reports to a third party that must be trusted by CSPs, customers and the Cloud Broker. The third party provides transparency by publishing reports to the authorized parties (CSPs and Customers).
A REVIEW ON LOAD BALANCING IN CLOUD USING ENHANCED GENETIC ALGORITHM IAEME Publication
“Cloud computing” is a term, which involves virtualization, distributed
computing, networking, software and net services. A cloudconsists of several partssuch as shoppers, datacenter and distributed servers. It includes fault tolerance, high
availability, scalability, flexibility, reduced overhead for users, reduced cost of
possession, on demand services etc. Central to these issues lies the institution of a
good load reconciliation algorithmic rule. The load can be CPU load, memory
capacity, delay or network load. Load balancing is the method of distributing the load
among varied nodes of a distributed system to boost each resource utilization and job
interval whereas additionally avoiding a state of affairs wherever a number of the
nodes area unit heavily loaded whereas different nodes area unit idle or doing little
work. Load balancing ensures that all the processors within the system or each node
within the network will require the equal quantity of labor at any instant of your time.
This technique will be sender initiated, receiver initiated or symmetric sort
(combination of sender initiated and receiver initiated types). Our objective is to
develop an effective load reconciliation algorithmic rule mistreatment divisible load
programming theorem to maximize or minimize completely different performance
parameters (throughput, latency for example) for the clouds of different sizes (virtualtopology de-pending on the appliance requirement).
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...IJERA Editor
Cloud storage systems to protect data from corruptions, redundant data to tolerate failures of storage and lost data should be repaired when storage fails. Regenerating codes provide fault tolerance by striping data across multiple servers, while using less repair traffic than traditional erasure codes during failure recovery. In previous research implemented practical Data Integrity Protection (DIP) scheme for regenerating-coding based cloud storage. Functional Minimum-Storage Regenerating (FMSR) codes and it construct FMSR-DIP codes, which allow clients to remotely verify the integrity of random subsets of long-term archival data under a multi server setting. The problem is to optimize bandwidth consumption when repairing multiple failures. The cooperative repair of multiple failures can help to further save bandwidth consumption when multiple failures are being repaired.
BUSINESS SILOS INTEGRATION USING SERVICE ORIENTED ARCHITECTUREIJCSEA Journal
Agile integration satisfies the business agility and provides solutions for maintaining business changes and ensures that the enterprise survives in the current competition. Any business should be robust enough to respond to end user request. Existing traditional enterprise applications are in-capable of integrating with
different business silos lacks to improve the business agility. To address this issue, this paper is about the agile integration of different business silos using “Service Oriented Architecture” and its core technologyenables the business enterprise systems flexible, loosely coupled and improves agility. Enterprise business
systems have to adopt Service Oriented Architecture (SOA) as it promises to help them respond more rapidly to changing business requirements by composing new solutions from existing business services. Here the definition of SOA, its layers and the core technologies have been discussed.
ADVANCES IN HIGHER EDUCATIONAL RESOURCE SHARING AND CLOUD SERVICES FOR KSAIJCSES Journal
Cloud represents an important change in the way information technology is used. Cloud makes it possible
to access work anywhere anytime and to share it with anyone [1]. It is changing the way people
communicate, work and learn [2]. In this changing environment, it is important to think about the
opportunities and risks of using the cloud in the education field, and the lessons we can learn from the
previous uses of this technology in the education field. In order to gain the benefits of the cloud to be used
in educational system in KSA, a comprehensive study on scientific literatures in this paper. This paper also
presents the significant information such as the findings, the case studies, related frameworks and
supporting also the tools associated to the migration of organizational resources to cloud
A survey on various resource allocation policies in cloud computing environmenteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
User requirements and Resource Management is more important in cloud computing.
Automation of user requirements phase is still not available in a cloud scenario. User
requirements layer specifies the capacity of virtual machine required by the user and
applicatons to be placed within the virtual machine. Based on the history of user requirements
in an academic institution they could be converted into packages and the user selects the
appropriate package. User requirements are then mapped to both SMI and SLA for appropriate
package selection. Both the user requirements and packages rely on the underling infrastructure
resources. Hence effective resource management is must in academic institutions.
360º Degree Requirement Elicitation Framework for Cloud Service ProvidersIJERA Editor
Thisstudy addresses the factors responsible for cloud computing adoption in implementing cloud computing for any organization. Service Level Agreements play a major role for cloud consumer as well as for cloud provider. SLA depends on the requirements gathered by the cloud providers and they vary with the type of organizations for which process is being performed such as education, retail, IT industry etc. SLAs for cloud computing involves technical as well as business requirements which makes the gathering of requirements from stakeholders point of view the heterogeneous process. This research work proposes a 360 degree requirement gathering framework, which reduces the complexitiesduring the process of requirement gathering by cloud service providersas well as SLAs more reliant.
SenseChain: A Blockchain-based Crowdsensing Framework For Multiple Requesters...Maha Kadadha
In this paper, we propose a decentralized crowdsensing framework for multiple requesters with multiple workers built on Ethereum blockchain- SenseChain. Crowdsensing frameworks utilize workers’ sensing capabilities to fulfill requesters’ sensing tasks. While crowdsensing is typically managed by a centralized platform, the centralized management entails various challenges such as reliability in workers’ selection, fair evaluation for payment distribution, potential breach of users’ privacy, and high deployment cost. The proposed solution, SenseChain, is a decentralized crowdsensing framework developed to run on Ethereum blockchain to mitigate said challenges while increasing users’ engagement, with reasonable cost. SenseChain is developed around three smart contracts: 1) User Manager Contract (UMC), 2) Task Manager Contract (TMC), and 3) Task Detailed Contract (TDC). These contracts implement the platform features such as maintaining users’ information, publishing tasks from multiple requesters, accepting reservations and solutions from multiple workers, and evaluating solutions to calculate proportional payments. The framework is implemented using Solidity and Web3.js, where a real publicly available dataset is used. The framework performance is compared to a centralized greedy selection framework to demonstrate its comparability while mitigating tackled challenges. The results in terms of solutions quality, time cost, and workers traveled distance confirm its viability as a solution for crowdsensing.
Link: https://www.researchgate.net/publication/338029700_SenseChain_A_blockchain-based_crowdsensing_framework_for_multiple_requesters_and_multiple_workers
Field service application (FSA) refers to a cloud-based system that combines the robust web application and
dynamic mobile application to support field engineers. FSA most commonly caters to the customer who needs
service or repairs of equipment. This application is targeted at the Service industry, intended for the field
engineers. The various service industries register with this for cloud computing services for effective management
of services such as painting, plumbing, Electrician, carpenter etc. This system compliments the software services,
provided by the cloud, with a mobile-based client application, specially designing for the field engineers. This
solution shares a single workflow among the registered tenants thereby ensuring efficient sharing of infrastructure
and also ensuring the security and integrity tenant data.A Multi-tenant Application is an approach to share an
application instance among different customers to reduce overhead the most.
DESIGNING ASPECT AND FUNCTIONALITY ISSUES OF CLOUD BROKERING SERVICE IN CLOUD...Souvik Pal
Cloud brokering service is an intermediate service which enables the producer-consumer business model
enforcing the easy access to cloud services from Cloud Service Providers (CSPs). Cloud broker is to
provide a platform where broker collects the information from the user, analyze the data, and sends those
data to the CSPs. Cloud broker also provides data integration services and modeling the data across all the
components or units of the cloud services. This paper deals with designing criteria and issues of cloud
broker, system activity of broker, and sequence diagram of system design with implementation procedure.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONINGIJCNCJournal
As cloud computing is increasingly transforming the information technology landscape, organizations and
businesses are exhibiting strong interest in Software-as-a-Service (SaaS) offerings that can help them
increase business agility and reduce their operational costs. They increasingly demand services that can
meet their functional and non-functional requirements. Given the plethora and the variety of SaaS
offerings, we propose, in this paper, a framework for SaaS provisioning, which relies on brokered Service
Level agreements (SLAs), between service consumers and SaaS providers. The Cloud Service Broker (CSB)
helps service consumers find the right SaaS providers that can fulfil their functional and non-functional
requirements. The proposed selection algorithm ranks potential SaaS providers by matching their offerings
against the requirements of the service consumer using an aggregate utility function. Furthermore, the CSB
is in charge of conducting SLA negotiation with selected SaaS providers, on behalf of service consumers,
and performing SLA compliance monitoring
MMB Cloud-Tree: Verifiable Cloud Service SelectionIJAEMSJORNAL
In the existing cloud brokerage system, the client does not have the ability to verify the result of the cloud service selection. There are possibilities that the cloud broker can be biased in selecting the best Cloud Service Provider (CSP) for a client. A compromised or dishonest cloud broker can unfairly select a CSP for its own advantage by cooperating with the selected CSP. To address this problem, we propose a mechanism to verify the CSP selection result of the cloud broker. In this verification mechanism, properties of every CSP will also be verified. It uses a trusted third party to gather clustering result from the cloud broker. This trusted third party is also used as a base station to collect CSP properties in a multi-agent’s system. Software Agents are installed and running on every CSP. The CSP is monitored by agents as the representative of the customer inside the cloud. These multi-agents give reports to a third party that must be trusted by CSPs, customers and the Cloud Broker. The third party provides transparency by publishing reports to the authorized parties (CSPs and Customers).
A REVIEW ON LOAD BALANCING IN CLOUD USING ENHANCED GENETIC ALGORITHM IAEME Publication
“Cloud computing” is a term, which involves virtualization, distributed
computing, networking, software and net services. A cloudconsists of several partssuch as shoppers, datacenter and distributed servers. It includes fault tolerance, high
availability, scalability, flexibility, reduced overhead for users, reduced cost of
possession, on demand services etc. Central to these issues lies the institution of a
good load reconciliation algorithmic rule. The load can be CPU load, memory
capacity, delay or network load. Load balancing is the method of distributing the load
among varied nodes of a distributed system to boost each resource utilization and job
interval whereas additionally avoiding a state of affairs wherever a number of the
nodes area unit heavily loaded whereas different nodes area unit idle or doing little
work. Load balancing ensures that all the processors within the system or each node
within the network will require the equal quantity of labor at any instant of your time.
This technique will be sender initiated, receiver initiated or symmetric sort
(combination of sender initiated and receiver initiated types). Our objective is to
develop an effective load reconciliation algorithmic rule mistreatment divisible load
programming theorem to maximize or minimize completely different performance
parameters (throughput, latency for example) for the clouds of different sizes (virtualtopology de-pending on the appliance requirement).
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...IJERA Editor
Cloud storage systems to protect data from corruptions, redundant data to tolerate failures of storage and lost data should be repaired when storage fails. Regenerating codes provide fault tolerance by striping data across multiple servers, while using less repair traffic than traditional erasure codes during failure recovery. In previous research implemented practical Data Integrity Protection (DIP) scheme for regenerating-coding based cloud storage. Functional Minimum-Storage Regenerating (FMSR) codes and it construct FMSR-DIP codes, which allow clients to remotely verify the integrity of random subsets of long-term archival data under a multi server setting. The problem is to optimize bandwidth consumption when repairing multiple failures. The cooperative repair of multiple failures can help to further save bandwidth consumption when multiple failures are being repaired.
BUSINESS SILOS INTEGRATION USING SERVICE ORIENTED ARCHITECTUREIJCSEA Journal
Agile integration satisfies the business agility and provides solutions for maintaining business changes and ensures that the enterprise survives in the current competition. Any business should be robust enough to respond to end user request. Existing traditional enterprise applications are in-capable of integrating with
different business silos lacks to improve the business agility. To address this issue, this paper is about the agile integration of different business silos using “Service Oriented Architecture” and its core technologyenables the business enterprise systems flexible, loosely coupled and improves agility. Enterprise business
systems have to adopt Service Oriented Architecture (SOA) as it promises to help them respond more rapidly to changing business requirements by composing new solutions from existing business services. Here the definition of SOA, its layers and the core technologies have been discussed.
ADVANCES IN HIGHER EDUCATIONAL RESOURCE SHARING AND CLOUD SERVICES FOR KSAIJCSES Journal
Cloud represents an important change in the way information technology is used. Cloud makes it possible
to access work anywhere anytime and to share it with anyone [1]. It is changing the way people
communicate, work and learn [2]. In this changing environment, it is important to think about the
opportunities and risks of using the cloud in the education field, and the lessons we can learn from the
previous uses of this technology in the education field. In order to gain the benefits of the cloud to be used
in educational system in KSA, a comprehensive study on scientific literatures in this paper. This paper also
presents the significant information such as the findings, the case studies, related frameworks and
supporting also the tools associated to the migration of organizational resources to cloud
A survey on various resource allocation policies in cloud computing environmenteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
User requirements and Resource Management is more important in cloud computing.
Automation of user requirements phase is still not available in a cloud scenario. User
requirements layer specifies the capacity of virtual machine required by the user and
applicatons to be placed within the virtual machine. Based on the history of user requirements
in an academic institution they could be converted into packages and the user selects the
appropriate package. User requirements are then mapped to both SMI and SLA for appropriate
package selection. Both the user requirements and packages rely on the underling infrastructure
resources. Hence effective resource management is must in academic institutions.
360º Degree Requirement Elicitation Framework for Cloud Service ProvidersIJERA Editor
Thisstudy addresses the factors responsible for cloud computing adoption in implementing cloud computing for any organization. Service Level Agreements play a major role for cloud consumer as well as for cloud provider. SLA depends on the requirements gathered by the cloud providers and they vary with the type of organizations for which process is being performed such as education, retail, IT industry etc. SLAs for cloud computing involves technical as well as business requirements which makes the gathering of requirements from stakeholders point of view the heterogeneous process. This research work proposes a 360 degree requirement gathering framework, which reduces the complexitiesduring the process of requirement gathering by cloud service providersas well as SLAs more reliant.
SenseChain: A Blockchain-based Crowdsensing Framework For Multiple Requesters...Maha Kadadha
In this paper, we propose a decentralized crowdsensing framework for multiple requesters with multiple workers built on Ethereum blockchain- SenseChain. Crowdsensing frameworks utilize workers’ sensing capabilities to fulfill requesters’ sensing tasks. While crowdsensing is typically managed by a centralized platform, the centralized management entails various challenges such as reliability in workers’ selection, fair evaluation for payment distribution, potential breach of users’ privacy, and high deployment cost. The proposed solution, SenseChain, is a decentralized crowdsensing framework developed to run on Ethereum blockchain to mitigate said challenges while increasing users’ engagement, with reasonable cost. SenseChain is developed around three smart contracts: 1) User Manager Contract (UMC), 2) Task Manager Contract (TMC), and 3) Task Detailed Contract (TDC). These contracts implement the platform features such as maintaining users’ information, publishing tasks from multiple requesters, accepting reservations and solutions from multiple workers, and evaluating solutions to calculate proportional payments. The framework is implemented using Solidity and Web3.js, where a real publicly available dataset is used. The framework performance is compared to a centralized greedy selection framework to demonstrate its comparability while mitigating tackled challenges. The results in terms of solutions quality, time cost, and workers traveled distance confirm its viability as a solution for crowdsensing.
Link: https://www.researchgate.net/publication/338029700_SenseChain_A_blockchain-based_crowdsensing_framework_for_multiple_requesters_and_multiple_workers
Field service application (FSA) refers to a cloud-based system that combines the robust web application and
dynamic mobile application to support field engineers. FSA most commonly caters to the customer who needs
service or repairs of equipment. This application is targeted at the Service industry, intended for the field
engineers. The various service industries register with this for cloud computing services for effective management
of services such as painting, plumbing, Electrician, carpenter etc. This system compliments the software services,
provided by the cloud, with a mobile-based client application, specially designing for the field engineers. This
solution shares a single workflow among the registered tenants thereby ensuring efficient sharing of infrastructure
and also ensuring the security and integrity tenant data.A Multi-tenant Application is an approach to share an
application instance among different customers to reduce overhead the most.
Cloud service ranking with an integration of k-means algorithm and decision-m...IJECEIAES
The present research focuses on ranking cloud services by using the k-means algorithm with multi-criteria decision-making (MCDM) approaches that are the prime factor in the decision-making process and have been used to choose cloud services. The tools offered by MCDM can solve almost any decision-making problem. When faced with a selection challenge in the cloud environment, the trusted party would need to weigh the client’s choice against a predetermined list of criteria. There is a wide range of approaches to evaluating the quality of cloud services. The deep learning model has been considered a branch of artificial intelligence that assesses datasets to perform training and testing and makes decisions accordingly. This paper presents a concise overview of MCDM approaches and discusses some of the most commonly used MCDM methods. Also, a model based on deep learning with the k-means algorithm based decision-making trial and evaluation laboratory (kDE-MATEL) and analytic network process (ANP) is proposed as k-means algorithm based decision-making trial and evaluation laboratory with analytic network process (kD-ANP) for selecting cloud services. The proposed model uses the k-means algorithm and gives different levels of priority and weight to a set of criteria. A traditional model is also compared with a proposed model to reflect the efficiency of the proposed approach.
Revenue Maximization with Good Quality of Service in Cloud ComputingINFOGAIN PUBLICATION
Cloud computing enables people to use resources and services without implementing them on their systems. Profit and quality of service is the most important factor for service providers and it is mainly determined by the configuration of a cloud service platform under given market demand. Single long term renting scheme is usually adopted to design a cloud platform which leads to resource waste and having more renting charges. The novel double renting scheme which is combination of short term and long term renting is aiming at existing issue. This double renting scheme will effectively and efficiently promises a good quality of service of all request and reduces the resource waste significantly. It also provides services with lower cost compared to short term renting scheme. It uses optimal queuing model to maximize the profit. That means the users can access the services simultaneously. The main objective of proposed system is, to maximize profit of service provider by providing efficient and effective services to user.
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...Editor IJCATR
Cloud computing has recently emerged as one of the buzzwords in the IT industry. Several IT vendors are promising to offer computation, data/storage, and application hosting services, offering Service-Level Agreements (SLA) backed performance and uptime promises for their services. While these „clouds‟ are the natural evolution of traditional clusters and data centers, they are distinguished by following a pricing model where customers are charged based on their utilization of computational resources, storage and transfer of data. They offer subscription-based access to infrastructure, platforms, and applications that are popularly termed as IaaS (Infrastructure as a Service), PaaS (Platform as a Service), and SaaS (Software as a Service). In order to improve the profit of service providers we implement a technique called hybrid pricing , where this hybrid pricing model is a pooled with fixed and spot pricing techniques.
A study secure multi authentication based data classification model in cloud ...IJAAS Team
Abstract: Cloud computing is the most popular term among enterprises and news. The concepts come true because of fast internet bandwidth and advanced cooperation technology. Resources on the cloud can be accessed through internet without self built infrastructure. Cloud computing is effectively managing the security in the cloud applications. Data classification is a machine learning technique used to predict the class of the unclassified data. Data mining uses different tools to know the unknown, valid patterns and relationshipsin the dataset. These tools are mathematical algorithms, statistical models and Machine Learning (ML) algorithms. In this paper author uses improved Bayesian technique to classify the data and encrypt the sensitive data using hybrid stagnography. The encrypted and non encrypted sensitive data is sent to cloud environment and evaluate the parameters with different encryption algorithms.
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTINGijccsa
Cloud computing is an on-demand service resource which includes applications to data centers on a
pay-per-use basis. In order to allocate these resources properly and satisfy users’ demands, an efficient
and flexible resource allocation mechanism is needed. Due to increasing user demand, the resource
allocating process has become more challenging and difficult. One of the main focuses of research
scholars is how to develop optimal solutions for this process. In this paper, a literature review on proposed
dynamic resource allocation techniques is introduced.
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTINGijccsa
Cloud computing is an on-demand service resource which includes applications to data centers on a
pay-per-use basis. In order to allocate these resources properly and satisfy users’ demands, an efficient
and flexible resource allocation mechanism is needed. Due to increasing user demand, the resource
allocating process has become more challenging and difficult. One of the main focuses of research
scholars is how to develop optimal solutions for this process. In this paper, a literature review on proposed
dynamic resource allocation techniques is introduced.
A Survey on Resource Allocation in Cloud Computingneirew J
Cloud computing is an on-demand service resource which includes applications to data centers on a
pay-per-use basis. In order to allocate these resources properly and satisfy users’ demands, an efficient
and flexible resource allocation mechanism is needed. Due to increasing user demand, the resource
allocating process has become more challenging and difficult. One of the main focuses of research
scholars is how to develop optimal solutions for this process. In this paper, a literature review on proposed
dynamic resource allocation techniques is introduced.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
A Generic Model for Student Data Analytic Web Service (SDAWS)Editor IJCATR
Any university management system accumulates a cartload of data and analytics can be applied on it to gather useful
information to aid the academic decision making process. This paper is a novel attempt to demonstrate the significance of a data
analytic web service in the education domain. This can be integrated with the University Management System or any other application
of the university easily. Analytics as a web service offers much benefits over the traditional analysis methods. The web service can be
hosted on a web server and accessed over the internet or on to the private cloud of the campus. The data from various courses from
different departments can be uploaded and analyzed easily. In this paper we design a web service framework to be used in educational
data mining that provide analysis as a service.
A cloud computing using rough set theory for cloud service parameters through...csandit
Cloud Computing is an awesome technology which have go ahead and annex the computing
world. The development of cloud computing embed its sprouting continually in the recent era.
Cloud Computing have contrived clan very lavish comfortable to perform their chore. As its
fundamental defnition says that As You Pay As You Go. In this delving work talk about the cloud
simulator working in our algorithm which is prepared with the help of rough set theory. The
algorithm is implemented in the cloud simulator in which cloudlets, datacenters, cloud brokers
are created to perform the algorithms with the help of rough sets. The Ontology is the system
consists of cloud services in which cloud service discovery system is maintained. At last there is
the implementation of work done using the rough set in cloud simulator using net beans and sql
as back end. The net beans is loaded with the cloud Sim packages in which some of the
packages are prepared according to our algorithm and gives the expected output of the
optimization using rough set as a new concept
A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH...csandit
Cloud Computing is an awesome technology which have go ahead and annex the computing world. The development of cloud computing embed its sprouting continually in the recent era. Cloud Computing have contrived clan very lavish comfortable to perform their chore. As its fundamental defnition says that As You Pay As You Go. In this delving work talk about the cloud simulator working in our algorithm which is prepared with the help of rough set theory. The algorithm is implemented in the cloud simulator in which cloudlets, datacenters, cloud brokers are created to perform the algorithms with the help of rough sets. The Ontology is the system consists of cloud services in which cloud service discovery system is maintained. At last there is the implementation of work done using the rough set in cloud simulator using net beans and sql as back end. The net beans is loaded with the cloud Sim packages in which some of the packages are prepared according to our algorithm and gives the expected output of the optimization using rough set as a new concept.
A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH...cscpconf
Cloud Computing is an awesome technology which have go ahead and annex the computing
world. The development of cloud computing embed its sprouting continually in the recent era.
Cloud Computing have contrived clan very lavish comfortable to perform their chore. As its
fundamental defnition says that As You Pay As You Go. In this delving work talk about the cloud
simulator working in our algorithm which is prepared with the help of rough set theory. The
algorithm is implemented in the cloud simulator in which cloudlets, datacenters, cloud brokers
are created to perform the algorithms with the help of rough sets. The Ontology is the system
consists of cloud services in which cloud service discovery system is maintained. At last there is
the implementation of work done using the rough set in cloud simulator using net beans and sql
as back end. The net beans is loaded with the cloud Sim packages in which some of the
packages are prepared according to our algorithm and gives the expected output of the
optimization using rough set as a new concept.
THE EFFECT OF THE RESOURCE CONSUMPTION CHARACTERISTICS OF CLOUD APPLICATIONS ...ijccsa
Auto scaling is a service provided by the cloud service provider that allows provision of temporary
resources to the subscriber’s systems to prevent overloading. So far, many methods of auto scaling have
been proposed and applied. Among them, solutions based on low-level metrics are commonly used in
industry systems. Resource statistics are the basis for detecting overloading situation and making
additional resources in a timely manner. However, the effectiveness of these methods depends very much
on the accuracy of the overload calculation from low-level metrics. Overloading is mentioned in solutions
that usually favor a shortage of CPU resources. However, the demand for resources comes from the
application running on that each application has the characteristics of demanding different resource types,
with different CPU, memory, I/O ratios so it can not just be statistically on CPU consumption. The point of
view here is that even though based on low level resources, the source for calculation and forecasting is the
characteristic of the resource needs of the application. In this paper, we will develop an empirical model to
assess the effect of the application's resource consumption characteristics on the efficiency of the lowmetricauto scaling solutions and propose an auto scaling solution that is calculated based on statistics of
different types of resources. The results of the simulations show that the proposed solution based on
multiple resources is more positive.
THE EFFECT OF THE RESOURCE CONSUMPTION CHARACTERISTICS OF CLOUD APPLICATIONS ...ijccsa
Auto scaling is a service provided by the cloud service provider that allows provision of temporary resources to the subscriber’s systems to prevent overloading. So far, many methods of auto scaling have been proposed and applied. Among them, solutions based on low-level metrics are commonly used in industry systems. Resource statistics are the basis for detecting overloading situation and making additional resources in a timely manner. However, the effectiveness of these methods depends very much on the accuracy of the overload calculation from low-level metrics. Overloading is mentioned in solutions that usually favor a shortage of CPU resources. However, the demand for resources comes from the application running on that each application has the characteristics of demanding different resource types, with different CPU, memory, I/O ratios so it can not just be statistically on CPU consumption. The point of view here is that even though based on low level resources, the source for calculation and forecasting is the characteristic of the resource needs of the application. In this paper, we will develop an empirical model to assess the effect of the application's resource consumption characteristics on the efficiency of the lowmetricauto scaling solutions and propose an auto scaling solution that is calculated based on statistics of different types of resources. The results of the simulations show that the proposed solution based on multiple resources is more positive.
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
Cloud computing is a model for enabling convenient, on-demand network access
to a shared pool of configurable computing resources. Reliability in compute cloud is an
important aspect in Quality of Service which needs to be addressed in order to foster the
adoption of compute cloud. In today’s integrated environment the distributed systems is
employed to carry out computational intensive task at a faster rate without much
investment. The Cloud is a multitenant architecture which allows faster computation with
high scalability at a lower cost thereby the users can share the same physical infrastructure.
Individual customers deploy their applications in such environment will occupy the virtual
partitions on the platform. This paper describes a straightforward procedure to analyze the
reliability of the application from the view point of the resource provider. A trust
component is implemented to provide preventive control and to mitigate the occurrence of
any non-permissible action by using the detective mechanism. Such mechanisms are used to
identify the privacy risk and it further prevents from utilization. Hence, in this paper trust
assessment is performed before the user is allowed to share the multitenant infrastructure.
The cloud can provide scalable and reliable service for the legitimate users. The proposed
work is tested using tools Aneka and Globus Toolkit.
A Result on Novel Approach for Load Balancing in Cloud Computingijtsrd
Cloud computing is a large pool of system in which private or public networks are interconnected in order to provide the scalable infrastructure to application, data and file storage. It is considered as the computer archetype in which large amount of information is stored. It helps in the significant reduction of the cost of computation, application hosting, content storage and delivery. In order to experience direct cost benefits, cloud computing is considered as a practical approach and it can possibly transform a data center from a capital intensive set up to a variable priced environment. It provides the feasibility to its customers that they can access their information from anywhere they want. Therefore, cloud overcomes the limitation of the location constraint. As compared to traditional concepts, cloud computing coveys the concept of the grid computing, distributed computing, utility computing or autonomic computing. When any virtual machine gets overloaded, fault may occur in the cloud environment. With the help of BFO algorithm, technique of adaptive task scheduling is proposed. Using this method, it becomes easy to transfer the task to the most reliable virtual machine. On the basis of calculated weight at virtual machine, the reliability of the virtual machine is calculated. The proposed and existing algorithms have been implemented in CloudSim. On the basis of the simulation results, it is concluded that the proposed method shows the reduction in the execution time as compared to existing technique. Sukhdeep Kaur | Preeti Sondhi "A Result on Novel Approach for Load Balancing in Cloud Computing" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26362.pdfPaper URL: https://www.ijtsrd.com/engineering/computer-engineering/26362/a-result-on-novel-approach-for-load-balancing-in-cloud-computing/sukhdeep-kaur
Similar to Priority Based Prediction Mechanism for Ranking Providers in Federated Cloud Architecture (20)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
block diagram and signal flow graph representation
Priority Based Prediction Mechanism for Ranking Providers in Federated Cloud Architecture
1. G.Vadivel . Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 1, ( Part -4) January 2017, pp.81-85
www.ijera.com 81 | P a g e
Priority Based Prediction Mechanism for Ranking Providers in
Federated Cloud Architecture
1
G.Vadivel, Dr. 2
M. Aramudhan
1
Research Scholar, Dept. of CSE, Rayalaseema University Kurnool (A.P), India.
2
Asst. Prof, Dept. of IT, Perunthalaivar Kamarajar Inst of Engg&Technology, Nedugadu, Karikal, Puducherry,
India.
ABSTRACT
In Current trends the Cloud computing has a lot of potential to help hospitals cut costs, a new report says. Here‟s
some help overcoming some of the challenges hiding in the cloud. Previously there several methods are
available for this like Broker based trust architecture and etc. Health care framework which are patient, doctor,
symptom and disease. In this paper we are going to discuss the broker based architecture for federated cloud and
its Service Measurement Index considered for evaluating the providers,construction of Grade Distribution
Table(GDT),concept of ranking the providers based on prediction weights comparison, optimal service provider
selection and results discussion compared with existing techniques available for ranking the providers. In this
paper we are going to propose, two different ranking mechanisms to sort the providers and select the optimal
provider automatically. Grade distribution ranking model is proposed by assigning the grade for the providers
based on the values of SMI attributes, based on the total grade value, providers falls on either Gold, Silver or
Bronze. Each category applies the quick sort to sort the providers and find the provider at the top is optimal. If
there is more than one provider at the top, apply priority feedback based decision tree and find the optimal
provider for the request. In the second ranking mechanism, joint probability distribution mechanism is used to
rank the providers, two providers having same score, apply priority feedback based decision tree and find the
optimal provider for the request.
Keywords: Cloud computing, priority feedback based decision tree, Grade Distribution Table(GDT), Discovery
of service provider.
I. INTRODUCTION
Cloud computing is internet-based
computing, where shared servers provide
computing power, storage, development platforms
or software to computers and other devices on
demand.
Fig: The Basic Health Cloud Architecture.
This frequently takes the form of cloud
services, such as „Infrastructure as a Service‟
(IaaS), „Platform as a Service (PaaS)‟ or „Software
as a Service‟ (SaaS). Users can access web-based
tools or applications through a web browser or via
a cloud-based resource like storage or computer
power as if they were installed locally, eliminating
the need to install and run the application on the
customer‟s own computers and simplifying
maintenance and support. There are several
possible deployment models for clouds.
II. PREVIOUS WORK
Md Whaiduzzaman, Mohammad Nazmul
Haque proposed an method for this cloud health
care Analytical hierarchy process (AHP) is a tool
for decision makers to be able to do more informed
decisions regarding their investment in such
technologies. Service measurement index (SMI) is
a service measurement model based on business
model of the International Standard Organization
(ISO).The SMI Cloud model is proposed by Garg
et al. [1] which lets users compare different cloud
offerings, according to their priorities and along
several dimensions, and select whatever is
RESEARCH ARTICLE OPEN ACCESS
2. G.Vadivel . Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 1, ( Part -4) January 2017, pp.81-85
www.ijera.com 82 | P a g e
appropriate to their needs. Several challenges are
tackled in realizing the model for evaluating QoS
and ranking cloud providers. The SMICloud
systematically measures all the QoS features
proposed by cloud service measurement index
consortium (CSMIC) and ranks the cloud services
based on these business services. Again, Li et
al.Thesel problems are solved in our cloud based
proposed model. „Hybrid Clinical Decision Support
System for rural Bangladesh‟ is also a good support
system for healthcare. The authors have proposed
an automated diagnostic system which could be
used in the rural areas where there is a scarcity of
doctors .„A Hybrid Mobile-based Patient Location
Tracking System for Personal Healthcare
Applications‟ system uses cellular network
infrastructure using GPS system for tracking the
location of patients. So we have used the idea of
GPS in our proposed model to locate patient and
find out nearest specialist doctors in surrounding
area . NFC based patient appointment system is
also useful in our model as our model is flexible
and generic so we can add more features also
.Rajarajeswari and Aramudhan (2014) proposed a
new framework for cloud that maintains the SLA
by means of distinguished the incoming requests
either SLA based member or SLA based non-
member. Rajkumar Buyya et.al discussed the
framework which measures the quality, prioritizes
and selects the cloud services based on SMI
metrics and ranking the services using Analytic
Hierarchy Process (AHP). It is one of the flexible
ways for solving and adapted to any number of
attributes with any number of sub- attributes. AHP
model has three phases such as forming hierarchy
structure, pair wise comparisons and find
aggregated value to generate ranking of the
services. Authors proposed service mapper that
contains a technique called singular value
decomposition which is used for ranking the
services in statistical manner.In all the above
methods there is no efficient correlation from
symptoms to diseases and diseases to the specialist
doctor in previous systems. Our proposed system
predict appropriate diseases based on the symptoms
and then display the list of specialist doctors in
nearby areas.In this proposed federated cloud
architecture we are trying to overcome all these
drawbacks.
III. PROPOSED WORK
The proposed method is developed by
based on the Federated cloud architecture it refers
to a network of cloud providers that are
interconnected based on open standards to provide
a universal decentralized computing environment
where everything is driven by constraints and
agreements. Federated resource provisioning model
consists of three phases namely (i) Discovery of
service providers (ii) Rank the shortlisted service
provider (iii) assigning the service to the best
service provider. The customized broker based
federated architecture is shown in Figure -1. Broker
Manager (BM) collects the various levels of
services information offered by cloud service
providers through broker learning algorithm.
Brokers manage the cloud provider‟s resources,
collect its information and updates in Broker Status
Registry (BSR). BM communicates with brokers,
discovers the appropriate providers for the requests
and short list the providers. Broker based Learning
Algorithm (BLA) helps to study the workload of
the providers, understand the requirement of
resources for the service requests, analysis the
suitability of the providers automatically and
shortlist it. The clouds are managed by Cloud-
Brokers (CB) that is capable of handling service
requests and managing virtual machines within in
federate cloud systems. The components of the
broker Managers are Differentiated Module (DM),
Discovery of the Providers (DP) and Ranking the
providers. It must support the management of the
collaboration that includes all involved service
providers, partners, and end users or consumer.
Cloud clients are the users of the cloud services
that offer different services towards business goals
that driven resource sharing. Application Program
Interface (API) acts as an interface point for all
kinds of users to interact with services or offerings.
This architecture is based on the differential
module it was developed in the following steps.
Figure 1: Customized Broker Federated
Architecture.
3. G.Vadivel . Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 1, ( Part -4) January 2017, pp.81-85
www.ijera.com 83 | P a g e
Step 1: Compute the number of requests in
Member and Non- Member queues in the previous
session.
Step 2: Calculate the Request Deviation (RD) for
each queue using the formula,
RDi= (n * Ni)/ NT.
Step 3: Calculate the New Weighting Value
(NWV) for each queue
if (RDi > 1)
NWVi= ceil(RDi * Ni )
if
(RDi = = 1)
NWVi = Ni
else if
(RDi > 1)
NWVi= round(RDi * Ni )
Figure: 2 Discovery of service provider in
Federated Architecture.
Service Measurement Index (SMI)
Service Measurement Index Key
Performance Indicators attributes are falling in two
types namely measurable and Non-measurable.
These attributes are proposed by Cloud Service
Measurement Index Consortium (CSMIC) and
recognized by International Organization for
Standardization (ISO). Non measurable attributes
cannot be assigned with numeric value and are
mostly inferred based on user experiences.
Measurable attributes are those which can be
measured using software and hardware monitoring
tools. Some of the attributes considered to propose
a quality model for provider selection are average
response time, reliability, accuracy, service
sustainability, stability, adaptability,
interoperability, cost.
Grade Distribution Based Ranking Model
In the proposed model, the grading is
assigned for the providers based on the computed
values on the considered SMI attributes that used to
evaluate the performance of the providers in terms
of user, application and service. Three different
grading values are considered such as 1, 0.5, and
0.25. These grade values are distributed to the
considered SMI attributes by invoking Grade
Distribution Algorithm. After computing the total
grade values, the providers may fall on any one of
the category namely Gold, Silver and Bronze.
Figure 3: Grade Distribution Based Ranking
Model
Grade distribution algorithm works as
follows, First case, when availability of the
resource is either sufficiently enough or moderately
higher to compute the requests, then the value of
the weight „1‟ is to be assigned to that specific SMI
attribute. When the available resource is
approximately equal or moderately equal, then the
value of the weight „0.5‟ is assigned to that specific
SMI attribute. Third case, when available resource
is very much lower than the request then the value
of the weight „0.25‟ is assigned to that SMI
attribute. In similar way, other considered
measurable SMI attributes are distributed with
grade values as per the threshold and limit. These
tolerate values are not fixed, any time it variable is
based on the range of user submission. Based on
the total grade values, the providers may be fall on
any of the type namely Gold, Silver and Bronze.
Quick sort is the best sorting algorithm that placing
the providers in order. This algorithm takes O
(n log n) comparisons to sort n providers. In the
worst case, it makes O (n2
) comparisons, though
this behavior is rare, in this work, quick sort
technique is used to arrange service providers
based on the total grade value. If there is more than
one provider in each category having similar total
grade value, then selection of the optimal provider
is recognized by applying Priority Feedback
Decision Tree (PFDT). The working of grade
distribution based ranking model is shown in
Figure -2. At the last stage of the process, there is a
provider in each category. User may select the
4. G.Vadivel . Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 1, ( Part -4) January 2017, pp.81-85
www.ijera.com 84 | P a g e
category first and subsequently the provider in the
category as the need of the user, application and
service requirement. Each category is distinguished
with the metric called threshold and limit. Grade
based distribution algorithm creates clusters based
on threshold value among the short listed pool of
providers that attained the fulfillment of the request
submitted by the user. Time complexity of the
grade distribution algorithm is O (k*n*d*i) where
„k‟denotes the number of clusters, „n‟ refers the
number of providers,„d‟ denotes the number of
considered SMI attributes and „i‟ refers the
number of iterations needed.
IV. SIMULATION RESULTS &
ANALYSIS
The proposed ranking mechanism is
implemented in CloudSim.The average execution
time of members is highly significant to estimate
the performance of service providers. To prove
that, performance evaluation of the proposed
architecture is implemented in CloudSim using
Java. The general evaluation parameters considered
for the experiment are number of users, number of
cloud service providers, load factor of cloud service
providers, average load deviation, deadline of tasks
etc. The execution time for each task is assigned
randomly between 0.1ms to 0.5ms. Number of
users considered for the experiment are 1000, 5000
and 10000. Number of service providers available
is fixed as 10, and deadline for each request is fixed
as 0.5ms.Load factor is defined as the ratio
between the number of requests in CBM and the
number of cloud service providers. Load factor that
varies dynamically depends on the number of
requests arrived at CBM. The average load
deviation is defined as the average difference
between the load expected and load assigned to
cloud service provider. Performance of cloud
service provider decreases when load deviation gets
increased. Every cloud service provider consider
for the experiment has 50 computing hosts, 10GB
of memory, 2TB of storage, 1 processor with 1000
MIPS of capacity, and a time-shared VM
scheduler. Cloud broker on behalf of user request
consist of 256MB of memory, 1GB of storage, 1
CPU, and time-shared Cloudlet scheduler. The
broker requests instantiation of 25 VMs and
associates one Cloudlet to each VM to be executed.
The experimental results prove that the proposed
architecture keeps the load variation in control and
provides better performance of user workload. In
experiment a set of 1000, 5000 and 10000 requests
are submitted at a time and time taken for
identifying the category is negligible. Average
execution time for each request is randomly as-
signed. The average execution time of submitted
requests for both SLA and non-SLA members
using Strict Differentiated model (SDM) and DLPS
is listed in Table 1.
Table 1. Average execution time taken using
differential treatment
V. CONCLUSION
Nowadays, Cloud Computing has
becoming an emerging and fascinating model for
outsourcing various IT needs of the organization.
At present, there are several cloud providers
offering different services with different Quality of
Service and SLAs. In addition to that, service
providers also increasing wide range the in the
world, this leads ambiguity and distrust among the
users to select the suitable service provider which
can satisfy their QoS requirements in terms of
Service Measurement Index suggested by Cloud
Service Measurement Index Consortium (CSMIC).
The aim of this consortium is to define each of QoS
attributes given in the framework, provide a
methodology for computing the index attributes for
Cloud services and rank them. Therefore many
authors proposed different ranking frame work to
select best service providers based on the user,
application and service requirements. In this
chapter, two different ranking mechanisms are
proposed to sort the providers and select the
optimal provider automatically. Grade distribution
ranking model is proposed by assigning the grade
for the providers based on the values of SMI
attributes, based on the total grade value, providers
falls on either Gold, Silver or Bronze. Each
category applies the quick sort to sort the providers
and find the provider at the top is optimal. If there
is more than one provider at the top, apply priority
feedback based decision tree and find the optimal
provider for the request. In the second ranking
mechanism, joint probability distribution
mechanism is used to rank the providers, two
providers having same score, apply priority
feedback based decision tree and find the optimal
provider for the request. Simulation results shows
that the proposed ranking mechanism provides
better performance compared to the existing
mechanisms such as fuzzy logic set, regression tree
and point care method.
5. G.Vadivel . Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 1, ( Part -4) January 2017, pp.81-85
www.ijera.com 85 | P a g e
REFERENCES
[1]. S.K.Garg, S. Versteeg, andR. Buyya, “A
framework for ranking of cloud
computing services,” Future Generation
Computer Systems, vol. 29, no. 4, pp.
1012–1023, 2013.
[2]. C.s. rajarajeswari, 2 m. Aramudhan
“ranking of cloud service providers in
cloud” journal of theoretical and applied
information technology, august 2015.
Vol.78. No.2.
[3]. P., Metri, G., Sarote (2011).Privacy Issues
and Challenges in Cloud Computing,
International Journal of Advanced
Engineering Sciences and Technologies
(IJAEST), vol. 5, pp.1-6.
[4]. IBM (2010), Cloud Deployment and
Delivery Models, Available from
https://www.ibm.com/developerworks/my
developerworks/c2028fdc [Accessed13-
July -2011].
[5]. Chenguang he, Xiaomao fan, Ye li (Jan
2013),Toward Ubiquitous Healthcare
Services With a Novel Efficient Cloud
Platform, Biomedical Engineering, IEEE
Transactions on, Vol. 60, no. , pp. 230 –
234.
[6]. Ahn, Y.W.; Cheng, A.M.K.; Baek, J.; Jo,
M.; Chen, H.-H (2013). An auto-scaling
mechanism for virtual resources to support
mobile, pervasive, Realtime healthcare
applications in cloud, Network, IEEE,
Volume: 27, pp.: 62 – 6
[7]. Al Iqbal, R (2012). Hybrid clinical
decision support system: An automated
diagnostic system for rural Bangladesh.
Informatics, Electronics & Vision
(ICIEV), 2012 International Conference
on, Page(s): 76 – 81
[8]. Ilayaraja, M. ; Meyyappan, T.
(2013).Mining medical data to identify
frequent diseases using Apriori algorithm,
Pattern Recognition, Informatics and
Mobile Engineering (PRIME), 2013
International Conference on, Page(s): 194
– 199.
[9]. Chauhan, R.; Kumar, A. (2013), Cloud
computing for improved healthcare:
Techniques, potential and challenges, E-
Health and Bioengineering Conference
(EHB), 2013, Page(s): 1 – 4
[10]. Huang, Feixiang ; Wang,Shengyong ;
Chan,Chien- Chung(2012), Predicting
disease by using data mining based on
healthcare information system, Granular
Computing (GrC), 2012 IEEE
International Conference on, Page(s): 191
– 19
[11]. Saurabh kumar Garg, Steve Versteeg and
Rajkumar Buyya, “ SMICloud: A
framework for comparing and Ranking
cloud services” Fourth IEEE International
Conference on Utility and Cloud
computing, 2011 pp 210-219.
[12]. Princy Bathla, Sahil Vashist, “ SLA
Aware Cost based Service Ranking in
Cloud Computing”, International Journal
of Application on Innovation in
Engineering and Management, Vol.2 Issue
7 July 2014
[13]. Buyya, R., Ranjan, R., & Calheiros, R. N.
(2009). Modeling and Simulation of
Scalable Cloud Computing Environments
and the CloudSim Toolkit: Challenges and
Opportunities. Proceedings of the 7th
High Performance Computing and
Simulation Conference, Germany.
Leipzig, Germany (pp.1-11).
doi:10.1109/HPCSIM.2009.5192685
[14]. Buyya, R., Ranjan, R., & Calheiros, R. N.
(2010). InterCloud: Utility-oriented
federation of Cloud computing
environments for scaling of application
services.10th International Conference on
Algorithms and Architectures for Parallel
Processing, Busan,
[15]. K. Mohan and M. Aramudhan,
aDepartment of Computer Science and
Engineering, Sathyabama University,
Chennai, India; bPKIET , Karaikal, India,
Broker based trust architecture for
federated healthcare cloud system,
Intelligent Automation & Soft Computing,
2016 TASJ 1220118,