期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Cost Effective Optimal Task Scheduling Model in Hybrid Cloud Environment
1
作者 M.Manikandan r.subramanian +1 位作者 M.S.Kavitha S.Karthik 《Computer Systems Science & Engineering》 SCIE EI 2022年第9期935-948,共14页
In today’s world, Cloud Computing (CC) enables the users to accesscomputing resources and services over cloud without any need to own the infrastructure. Cloud Computing is a concept in which a network of devices, lo... In today’s world, Cloud Computing (CC) enables the users to accesscomputing resources and services over cloud without any need to own the infrastructure. Cloud Computing is a concept in which a network of devices, located inremote locations, is integrated to perform operations like data collection, processing, data profiling and data storage. In this context, resource allocation and taskscheduling are important processes which must be managed based on the requirements of a user. In order to allocate the resources effectively, hybrid cloud isemployed since it is a capable solution to process large-scale consumer applications in a pay-by-use manner. Hence, the model is to be designed as a profit-driven framework to reduce cost and make span. With this motivation, the currentresearch work develops a Cost-Effective Optimal Task Scheduling Model(CEOTS). A novel algorithm called Target-based Cost Derivation (TCD) modelis used in the proposed work for hybrid clouds. Moreover, the algorithm workson the basis of multi-intentional task completion process with optimal resourceallocation. The model was successfully simulated to validate its effectivenessbased on factors such as processing time, make span and efficient utilization ofvirtual machines. The results infer that the proposed model outperformed theexisting works and can be relied in future for real-time applications. 展开更多
关键词 Cost effectiveness hybrid cloud optimal task scheduling virtual machine resource allocation make span
在线阅读 下载PDF
Hash Function Based Keyword Searchable Encryption Framework in Cloud Server Using MD5 and MECC
2
作者 R.Lakshmana Kumar r.subramanian S.Karthik 《Journal of Information Hiding and Privacy Protection》 2021年第4期201-226,共26页
Cloud Computing expands its usability to various fields that utilize data and store it in a common space that is required for computing and the purpose of analysis as like the IoT devices.These devices utilize the clo... Cloud Computing expands its usability to various fields that utilize data and store it in a common space that is required for computing and the purpose of analysis as like the IoT devices.These devices utilize the cloud for storing and retrieving data since the devices are not capable of storing processing data on its own.Cloud Computing provides various services to the users like the IaaS,PaaS and SaaS.The major drawback that is faced by cloud computing include the Utilization of Cloud services for the storage of data that could be accessed by all the users related to cloud.The use of Public Key Encryptions with keyword search(PEKS)provides security against the untrustworthy third-party search capability on publicly encryption keys without revealing the data’s contents.But the Security concerns of PEKs arise when Inside Keywords Guessing attacks(IKGA),is identified in the system due to the untrusted server presume the keyword in trapdoor.This issue could be solved by using various algorithms like the Certificateless Hashed Public Key Authenticated Encryption with Keyword Search(CL-HPAEKS)which utilizes the Modified Elliptic Curve Cryptography(MECC)along with the Mutation Centred flower pollinations algorithm(CM-FPA)that is used in enhancing the performance of the algorithm using the Optimization in keys.The additional use of Message Digests 5(MD5)hash function in the system enhances the security Level that is associated with the system.The system that is proposed achieves the security level performance of 96 percent and the effort consumed by the algorithm is less compared to the other encryption techniques. 展开更多
关键词 Certificateless Hashed Public Key Authenticated Encryption with Keyword Search(CL-HPAEKS) modified elliptic curve cryptography(MECC) digest 5(MD5) inside keywords guessing attacks(IKGA) public key encryptions with keyword search(PEKS)
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部