SlideShare a Scribd company logo
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1054
An Adaptive scheduling based VM with random key authentication on
cloud data access
C. Surya1, S. Nanthini2
1,2Assistant Professor (CSE), Sri Ramakrishna College of Engineering, Perambalur, TamilNadu
----------------------------------------------------------------------***---------------------------------------------------------------------
ABSTRACT— With the tremendous growth of cloud computing, it is increasingly critical to provide quantifiable
performance to tenants and to improve resource utilization for the cloud provider. Those recent proposals focus on
guaranteeing job performance. In the cloud, they usually lack efficient utilization of cloud resource, or vice versa. In this paper
we present cloud, which leverages the (soft) deadlines of cloud computing jobs to enable flexible and efficient resource
utilization in data centers. With the deadline requirement of a job guaranteed, cloud employs both time sliding and
bandwidth scaling in resource allocation. So as to better match the resource allocated to the job with the cloud’s residual
resource. Extensive simulations and test bed experiments show that cloud can accept much more jobs than existing solutions,
and significantly increase the cloud provider’s revenue with less cost for individual tenants.
KEYWORDS— authentication, bandwidth scaling, time sliding, virtual machine, CSP, resource provisioning, key
generation.
I. INTRODUCTION
Cloud computing has provision progressed from a bold vision to massive deployments in various application
domains. However, the complexity of technology underlying cloud computing introduces novel security risks and
challenges. From an end-user point of view the security of cloud infrastructure implies unquestionable trust in the cloud
provider, in some cases corroborated by reports of external auditors. While providers may offer security enhancements
such as protection of data at rest, end-users have limited or no control over such mechanisms.
There is a clear need for usable and cost-effective cloud platform security mechanisms suitable for organizations
that rely on cloud infrastructure. One such mechanism is platform integrity verification for compute hosts that support the
virtualized cloud infrastructure. Several large cloud vendors have signalled practical implementations of this mechanism,
primarily to protect the cloud infrastructure from insider threats and advanced persistent threats. We see two major
improvement vectors regarding these implementations.
First, details of such proprietary solutions are not disclosed and can thus not be implemented and improved by
other cloud platforms. Second, to the best of our knowledge, none of the solutions provides cloud tenants a proof regarding
the integrity of compute hosts supporting their slice of the cloud infrastructure. To address this, we propose a set of
protocols for trusted launch of virtual machines (VM) in IaaS, which provide tenants with a proof that the requested VM
instances were launched on a host with an expected software stack.
Another relevant security mechanism is encryption of virtual disk volumes, implemented and enforced at
compute host level. While support data encryption at rest is offered by several cloud providers and can be configured by
tenants in their VM instances, functionality and migration capabilities of such solutions are severely restricted. In most
cases cloud providers maintain and manage the keys necessary for encryption and decryption of data at rest. This further
convolutes the already complex data migration procedure between different cloud providers, disadvantaging tenants
through a new variation of vendor lock-in.
II. LITERATURE REVIEW
This section reviews the literatures on the various scheduling based methods that are carried out by different
researches. WeizhanZhang,YuxuanChen,XiangGao, Zhichao Mo, QinghuaZheng approached the cluster-aware VM
collaborative migration scheme for media cloud, tightly integrating clustering, placement, and dynamic migration process.
Evaluation results demonstrate that our scheme can effectively migrate virtual media servers in media cloud, while
reducing the total internal traffic in DCN under the resource consumption constraints of media streaming applications [1].
Mohammad Al-Fares, Alexander Loukissas, Amin Vahdat carried how to leverage largely commodity Ethernet switches
to support the full aggregate bandwidth of clusters consisting of tens of thousands of elements.Similar to how clusters of
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1055
commodity computers have largely replaced more specialized SMPs and MPPs, end solutions. This approach requires no
modifications to the end host network interface, operating system, or applications; critically [2].
ChuanxiongGuo,HaitaoWu,Kun Tan, Lei Shiy, Yongguang Zhang approached the DCell, a novel network structure that has
many desirable features for data center networking. DCell is a recursively defined structure, in which a high-level DCell is
constructed from many low-level DCells and DCells at the same level are fully connected with one another. DCell also
provides higher network capacity than the traditional tree- based structure for various types of services [3].
Timothy Wood, PrashantShenoy, ArunVenkataramani, MazinYousif investigated various approaches conduct a detailed
evaluation using a mix of CPU, network and memory-intensive applications. Our results show that Sandpiper is able to
resolve single server hotspots within 20 s and scales well to larger, data center environment. Server resources in a data
center are multiplexed across multiple applications each server runs one or more applications and application
components may be distributed across multiple servers [4]. Vincenzo De Maio, RaduProdan proposed a
energyconsumption model for network transfers.Such models should take into account all the actors (e.g. VMs, physical
hosts, network hardware) and activities (e.g. VM migration, powering down/off physical hosts) involved in the
consolidation. [5].
UmeshDeshpande, Xiaoshuang Wang, and, KartikGopalan approached the a comparative analysis of the energy
consumptionof the software stack of two of today's most used NICs in data centres, Ethernet and Inffniband. Consequently,
live migration has become a key ingredient behind a number of cluster management activities such as load balancing,
failure recovery, and system maintenance [6]. RajkumarBuyya,Chee Shin Yeo, SrikumarVenugopal, James Broberg
presented a cloud computing and provide the architecture for creating clouds with market-oriented resource allocation by
leveraging technologies such as Virtual Machine(VMs). Risk managementto sustain Service Level Agreement(SLA)-
oriented resource allocation [7].
VivekShrivastava, Petroszerfos, Kangwon Lee, Hani Jamjoomyee introduces AppAware-a novel, computationally
efficient scheme for incorporating (1) inter-VM dependencies and (2) the underlying network topology into VM migration
decisions. Using simulations, we show that our proposed method decreases network traffic by up to 81%compared to a
well-known alternative VM migration method that is not application-aware [8]. Fengwang, Jiangchuan Liu, Minghua Chen
proposed CALMS (Cloud-Assisted Live Media Streaming), a generic framework that facilitates a migration to the
cloud.CALMS adaptively lease and adjust cloud server resources in a fine granularity to accommodate temporal and spatial
dynamics of demands from live streaming users. While each being effective in certain aspects, having an all-round scalable,
reliable, responsive and cost-effective solution remains an illusive goal [9].
III. EXPERIMENTAL SETUP AND PROCEDURE
A. Management Process
The problem scales up, VMs are allocated to lower ranked servers and their happiness decreases, and servers are
allocated with higher ranked VMs, due to the increased competition among VMs. Also note that Multistage DA is only able
to improve the matching. In the upload a file in the cloud the admin can process the files. In the admin uploading and the
user downloading the files, the admin are going to upload file between them. They can share the uploaded files. User for
download files. System showed very good Performance in terms of speed, accuracy, and ease of use. The downloaded files
can be automatically stored.The user can download a file details can be viewed by the admin.
Fig.1. Management Process
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1056
B. Secure Key Generation
Secure Key Processing module generates the random keys to the users and sends those keys to the user’s respective
mail, whenever the user gets the key the system asks for the submission of those keys. After submitting the key to the
system, it checks the identities of the users whether they are authorized user or not.
Fig.2. Generation of Secure Key (KS)
C. Client Process
The Admin Process can upload a file, the user can search the files.Based on User requirements the admin can
upload the files the user can search the files from the admin upload the files. The search time includes fetching the posting
list in the index, ordering each entry.
Our focus is on top-k retrieval. As the, server can process the top-k retrieval almost as fast as in the plaintext
domain. Note that the server does not have to traverse every posting list for each given trapdoor, but instead uses a tree-
based data structure to fetch the corresponding list. Therefore, the overall search time cost is almost as efficient as on data.
Fig.3. Client Process
D. Resource Provisioning
An aggressive resource provisioning strategy which encourages to substantially increase the resource allocation
in each adaptation cycle when workload increases. The strategy first provisions resources which are possibly more than
actual demands, and then reduces the over-provisioned resources if needed this paper proposes, a system that
dynamically adjusting the number of virtual machine (VM) instances to ensure the QOS by accelerating the resource
provisioning in virtualized cloud computing environments.
The key idea behind is exploiting an aggressive strategy, which likely provisions resources that may exceed the actual
needs, satisfies the performance requirement at the very beginning of the adaptation process, and then decreases the over
provisioned resources if needed. The amount of the resources to be allocated is determined during runtime according to
the workload intensity and the amount of provisioned resources rather than a fixed number.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1057
Fig.4. Provisioning the resources
IV. CONCLUSION AND FUTURE ENHANCEMENT
A. Conclusion
Cloud-based media streaming applications in media cloud exhibit high resource consumption on server sides and
dynamic traffic flow among media servers. Such characteristics need to be fully considered during the VM placement and
migration processes. In this paper, we propose a cluster-aware VM collaborative migration scheme for media cloud, which
highly accommodates the characteristics of media streaming under cloud environment. In detail, the proposed scheme
simultaneously considers the infrastructure of the DCN and the application resource requirements of media servers. It
introduces a generic scheme of VM migration to optimize the internal traffic in media cloud, which tightly integrates
clustering, placement, and dynamic migration process. Simulation results demonstrate that the scheme can effectively
reduce the total internal traffic of DCN in media cloud. In this study, the proposed scheme does not fully consider the
application characters of media streaming to optimize the VM migration in media cloud.
B. Future Enhancement
The future work should try to devise a collaborative VM migration method focusing on the user experience of media
streaming application. Furthermore, due to the limitation of experimental environment, our scheme is just verified on the
simulation platform with the self-generated traffic patterns, and the scheme ignores some emergencies such as the failing
issue of VM migrations.
References
[1] Weizhan Zhang, Yuxuan Chen, Xiang Gao, Zhichao Mo, QinghuaZheng,” Cluster-Aware Virtual Machine Collaborative
Migration in Media Cloud,” in IEEE Transaction on Parallel and Distributes System, Vol 28, No 10, OCT 2017.
[2] M. Al-Fares, A. Loukissas, and A. Vahdat, “A scalable, commodity data center network architecture,” ACM SIGCOMM
Computer Communication Review, vol. 38, no. 4, pp. 63–74, 2008.
[3] C. Guo, H. Wu, K. Tan, L. Shi, Y. Zhang, and S. Lu, “Dcell: a scalable and fault-tolerant network structure for data
centers,” ACM SIGCOMM Computer Communication Review, vol. 38, no. 4, pp. 75–86, 2008.
[4] D. Niu, H. Xu, B. Li, and S. Zhao, “Quality-assured cloud bandwidth auto-scaling for video-on-demand applications,” in
Proc. of IEEE INFOCOM. IEEE, 2012, pp. 460–468.
[5] Y. Zhao, H. Jiang, K. Zhou, Z. Huang, and P. Huang, “Meeting service level agreement cost-effectively for video-on-
demand applications in the cloud,” in Proc. of IEEE INFOCOM. IEEE, 2014, pp. 298–306.
[6] F. Wang, J. Liu, and M. Chen, “Calms: Cloud-assisted live media streaming for globalized demands with time/region
diversities,” in Proc. of IEEE INFOCOM. IEEE, 2012, pp. 199–207.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1058
[7] T. Wood, P. Shenoy, A. Venkataramani, and M. Yousif, “Sandpiper: Black-box and gray-box resource management for
virtual machines,” Computer Networks, vol. 53, no. 17, pp. 2923–2938, 2009.
[8] V. De Maio, R. Prodan, S. Benedict, and G. Kecskemeti, “Modelling energy consumption of network transfers and virtual
machine migration,” Future Generation Computer Systems, vol. 56, pp. 388–406, 2016.
[9] J. Zhang, F. Ren, and C. Lin, “Delay guaranteed live migration of virtual machines,” in Proc. of IEEE INFOCOM. IEEE,
2014, pp. 574–582.
[10] H. Xu and B. Li, “Egalitarian stable matching for vm migration in cloud computing,” in Proc. of IEEE INFOCOM
WKSHPS. IEEE, 2011, pp. 631–636.
[11] J. Liu, Y. Li, and D. Jin, “Sdn-based live vm migration across datacenters,” in Proceedings of the 2014 ACM
conference on SIGCOMM. ACM, 2014, pp. 583–584.
[12] V. Shrivastava, P. Zerfos, K.-W. Lee, H. Jamjoom, Y.- H. Liu, and S. Banerjee, “Application-aware virtual machine
migration in data centers,” in Proc. of IEEE INFOCOM. IEEE, 2011, pp. 66–70.
[13] T. Yapicioglu and S. Oktug, “A traffic-aware virtual machine placement method for cloud data centers,” in
Proceedings of the IEEE/ACM 6th International Conference on Utility and Cloud Computing. IEEE Computer Society,
2013, pp. 299–301.
[14] D. S. Dias and L. H. M. Costa, “Online traffic-aware virtual machine placement in data center networks,” in Global
Information Infrastructure and Networking Symposium. IEEE, 2012, pp. 1–8.
[15] S. Zou, X. Wen, K. Chen, S. Huang, Y. Chen, Y. Liu, Y. Xia, and C. Hu, “Virtualknotter: Online virtual machine shuffling
for congestion resolving in virtualized datacenter,” Computer networks, vol. 67, pp. 141–153, 2014.
[16] Al-Fares, Alexander Loukissas, Amin Vahdat “A Scalable, Commodity Data Center Network Architecture
Mohammad” in IEEE transaction on 2008.
[17] R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, “Cloud computing and emerging it platforms: Vision, hype,
and reality for delivering computing as the 5th utility,” Future Generation computer systems, vol. 25, no. 6, pp. 599–616,
2009.
[18] Timothy Wood, PrashantShenoy, ArunVenkataramani, MazinYousif“Sandpiper: Black-box and gray-box resource
management for virtual machines” in 2009.
[19] Vincenzo De Maio, RaduProdan “Modelling Energy Consumption of Network Transfers and Virtual Machine
Migration” in IEEE transactions on 2016.
[20] UmeshDeshpande, Xiaoshuang Wang, and, KartikGopalan “Live Gang Migration of Virtual Machines” in IEEE
transaction on 2011
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072

More Related Content

PDF
Toward Cloud Computing: Security and Performance
PDF
IRJET- Load Balancing Cluster based on Linux Virtual Server
PDF
IRJET- Research Paper on Energy-Aware Virtual Machine Migration for Cloud Com...
PDF
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUD
PDF
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
PDF
Fs2510501055
PDF
Paper id 25201464
PDF
Performance, fault tolerance and scalability analysis of virtual infrastructu...
Toward Cloud Computing: Security and Performance
IRJET- Load Balancing Cluster based on Linux Virtual Server
IRJET- Research Paper on Energy-Aware Virtual Machine Migration for Cloud Com...
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUD
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
Fs2510501055
Paper id 25201464
Performance, fault tolerance and scalability analysis of virtual infrastructu...

What's hot (19)

DOCX
COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBR...
PPTX
Security Requirement Specification Model for Cloud Computing Services
PDF
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
DOCX
Project book on WINDS OF CHANGE:FROM VENDOR LOCK-IN TO THE META CLOUD
PDF
Embedded systems Implementation in Cloud Challenges
PDF
Mod05lec25(resource mgmt ii)
PPTX
Data Replication In Cloud Computing
PDF
A survey-report-on-cloud-computing-testing-environment
PDF
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
PDF
35 content distribution with dynamic migration of services for minimum cost u...
PDF
Load balancing in public cloud by division of cloud based on the geographical...
PDF
Towards enhancing resource
PDF
Live migration using checkpoint and restore in userspace (CRIU): Usage analys...
PDF
V04405122126
PDF
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
DOCX
Cloud computing
PDF
IRJET- Single to Multi Cloud Data Security in Cloud Computing
PDF
Implementation of the Open Source Virtualization Technologies in Cloud Computing
PDF
Gloucestershire Police
COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBR...
Security Requirement Specification Model for Cloud Computing Services
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
Project book on WINDS OF CHANGE:FROM VENDOR LOCK-IN TO THE META CLOUD
Embedded systems Implementation in Cloud Challenges
Mod05lec25(resource mgmt ii)
Data Replication In Cloud Computing
A survey-report-on-cloud-computing-testing-environment
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
35 content distribution with dynamic migration of services for minimum cost u...
Load balancing in public cloud by division of cloud based on the geographical...
Towards enhancing resource
Live migration using checkpoint and restore in userspace (CRIU): Usage analys...
V04405122126
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
Cloud computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Gloucestershire Police
Ad

Similar to IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Cloud Data Access (20)

PDF
AUTOMATED VM MIGRATION USING INTELLIGENT LEARNING TECHNIQUE
PDF
F1034047
PDF
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
PDF
E42053035
PDF
Virtual Machine Migration and Allocation in Cloud Computing: A Review
PDF
Load Balancing in Cloud Computing Environment: A Comparative Study of Service...
PDF
N1803048386
PDF
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
PDF
Implementation of the Open Source Virtualization Technologies in Cloud Computing
PDF
Providing user security guarantees
PDF
Providing user security guarantees
PDF
Performance Analysis of Server Consolidation Algorithms in Virtualized Cloud...
PDF
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUD
PDF
IRJET- In Cloud Computing Resource Allotment by using Resource Provisioning A...
PDF
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
PDF
A 01
PDF
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
PDF
Hybrid Based Resource Provisioning in Cloud
PDF
Maintaining Secure Cloud by Continuous Auditing
PDF
Resource Provisioning Algorithms for Resource Allocation in Cloud Computing
AUTOMATED VM MIGRATION USING INTELLIGENT LEARNING TECHNIQUE
F1034047
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
E42053035
Virtual Machine Migration and Allocation in Cloud Computing: A Review
Load Balancing in Cloud Computing Environment: A Comparative Study of Service...
N1803048386
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Providing user security guarantees
Providing user security guarantees
Performance Analysis of Server Consolidation Algorithms in Virtualized Cloud...
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUD
IRJET- In Cloud Computing Resource Allotment by using Resource Provisioning A...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
A 01
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Hybrid Based Resource Provisioning in Cloud
Maintaining Secure Cloud by Continuous Auditing
Resource Provisioning Algorithms for Resource Allocation in Cloud Computing
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
web development for engineering and engineering
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
PPT on Performance Review to get promotions
PDF
Well-logging-methods_new................
PPTX
Geodesy 1.pptx...............................................
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
Construction Project Organization Group 2.pptx
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
Sustainable Sites - Green Building Construction
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PDF
Digital Logic Computer Design lecture notes
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPT
Mechanical Engineering MATERIALS Selection
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Lesson 3_Tessellation.pptx finite Mathematics
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
web development for engineering and engineering
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPT on Performance Review to get promotions
Well-logging-methods_new................
Geodesy 1.pptx...............................................
bas. eng. economics group 4 presentation 1.pptx
Construction Project Organization Group 2.pptx
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Sustainable Sites - Green Building Construction
Strings in CPP - Strings in C++ are sequences of characters used to store and...
Digital Logic Computer Design lecture notes
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Mechanical Engineering MATERIALS Selection
UNIT-1 - COAL BASED THERMAL POWER PLANTS

IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Cloud Data Access

  • 1. © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1054 An Adaptive scheduling based VM with random key authentication on cloud data access C. Surya1, S. Nanthini2 1,2Assistant Professor (CSE), Sri Ramakrishna College of Engineering, Perambalur, TamilNadu ----------------------------------------------------------------------***--------------------------------------------------------------------- ABSTRACT— With the tremendous growth of cloud computing, it is increasingly critical to provide quantifiable performance to tenants and to improve resource utilization for the cloud provider. Those recent proposals focus on guaranteeing job performance. In the cloud, they usually lack efficient utilization of cloud resource, or vice versa. In this paper we present cloud, which leverages the (soft) deadlines of cloud computing jobs to enable flexible and efficient resource utilization in data centers. With the deadline requirement of a job guaranteed, cloud employs both time sliding and bandwidth scaling in resource allocation. So as to better match the resource allocated to the job with the cloud’s residual resource. Extensive simulations and test bed experiments show that cloud can accept much more jobs than existing solutions, and significantly increase the cloud provider’s revenue with less cost for individual tenants. KEYWORDS— authentication, bandwidth scaling, time sliding, virtual machine, CSP, resource provisioning, key generation. I. INTRODUCTION Cloud computing has provision progressed from a bold vision to massive deployments in various application domains. However, the complexity of technology underlying cloud computing introduces novel security risks and challenges. From an end-user point of view the security of cloud infrastructure implies unquestionable trust in the cloud provider, in some cases corroborated by reports of external auditors. While providers may offer security enhancements such as protection of data at rest, end-users have limited or no control over such mechanisms. There is a clear need for usable and cost-effective cloud platform security mechanisms suitable for organizations that rely on cloud infrastructure. One such mechanism is platform integrity verification for compute hosts that support the virtualized cloud infrastructure. Several large cloud vendors have signalled practical implementations of this mechanism, primarily to protect the cloud infrastructure from insider threats and advanced persistent threats. We see two major improvement vectors regarding these implementations. First, details of such proprietary solutions are not disclosed and can thus not be implemented and improved by other cloud platforms. Second, to the best of our knowledge, none of the solutions provides cloud tenants a proof regarding the integrity of compute hosts supporting their slice of the cloud infrastructure. To address this, we propose a set of protocols for trusted launch of virtual machines (VM) in IaaS, which provide tenants with a proof that the requested VM instances were launched on a host with an expected software stack. Another relevant security mechanism is encryption of virtual disk volumes, implemented and enforced at compute host level. While support data encryption at rest is offered by several cloud providers and can be configured by tenants in their VM instances, functionality and migration capabilities of such solutions are severely restricted. In most cases cloud providers maintain and manage the keys necessary for encryption and decryption of data at rest. This further convolutes the already complex data migration procedure between different cloud providers, disadvantaging tenants through a new variation of vendor lock-in. II. LITERATURE REVIEW This section reviews the literatures on the various scheduling based methods that are carried out by different researches. WeizhanZhang,YuxuanChen,XiangGao, Zhichao Mo, QinghuaZheng approached the cluster-aware VM collaborative migration scheme for media cloud, tightly integrating clustering, placement, and dynamic migration process. Evaluation results demonstrate that our scheme can effectively migrate virtual media servers in media cloud, while reducing the total internal traffic in DCN under the resource consumption constraints of media streaming applications [1]. Mohammad Al-Fares, Alexander Loukissas, Amin Vahdat carried how to leverage largely commodity Ethernet switches to support the full aggregate bandwidth of clusters consisting of tens of thousands of elements.Similar to how clusters of International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072
  • 2. © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1055 commodity computers have largely replaced more specialized SMPs and MPPs, end solutions. This approach requires no modifications to the end host network interface, operating system, or applications; critically [2]. ChuanxiongGuo,HaitaoWu,Kun Tan, Lei Shiy, Yongguang Zhang approached the DCell, a novel network structure that has many desirable features for data center networking. DCell is a recursively defined structure, in which a high-level DCell is constructed from many low-level DCells and DCells at the same level are fully connected with one another. DCell also provides higher network capacity than the traditional tree- based structure for various types of services [3]. Timothy Wood, PrashantShenoy, ArunVenkataramani, MazinYousif investigated various approaches conduct a detailed evaluation using a mix of CPU, network and memory-intensive applications. Our results show that Sandpiper is able to resolve single server hotspots within 20 s and scales well to larger, data center environment. Server resources in a data center are multiplexed across multiple applications each server runs one or more applications and application components may be distributed across multiple servers [4]. Vincenzo De Maio, RaduProdan proposed a energyconsumption model for network transfers.Such models should take into account all the actors (e.g. VMs, physical hosts, network hardware) and activities (e.g. VM migration, powering down/off physical hosts) involved in the consolidation. [5]. UmeshDeshpande, Xiaoshuang Wang, and, KartikGopalan approached the a comparative analysis of the energy consumptionof the software stack of two of today's most used NICs in data centres, Ethernet and Inffniband. Consequently, live migration has become a key ingredient behind a number of cluster management activities such as load balancing, failure recovery, and system maintenance [6]. RajkumarBuyya,Chee Shin Yeo, SrikumarVenugopal, James Broberg presented a cloud computing and provide the architecture for creating clouds with market-oriented resource allocation by leveraging technologies such as Virtual Machine(VMs). Risk managementto sustain Service Level Agreement(SLA)- oriented resource allocation [7]. VivekShrivastava, Petroszerfos, Kangwon Lee, Hani Jamjoomyee introduces AppAware-a novel, computationally efficient scheme for incorporating (1) inter-VM dependencies and (2) the underlying network topology into VM migration decisions. Using simulations, we show that our proposed method decreases network traffic by up to 81%compared to a well-known alternative VM migration method that is not application-aware [8]. Fengwang, Jiangchuan Liu, Minghua Chen proposed CALMS (Cloud-Assisted Live Media Streaming), a generic framework that facilitates a migration to the cloud.CALMS adaptively lease and adjust cloud server resources in a fine granularity to accommodate temporal and spatial dynamics of demands from live streaming users. While each being effective in certain aspects, having an all-round scalable, reliable, responsive and cost-effective solution remains an illusive goal [9]. III. EXPERIMENTAL SETUP AND PROCEDURE A. Management Process The problem scales up, VMs are allocated to lower ranked servers and their happiness decreases, and servers are allocated with higher ranked VMs, due to the increased competition among VMs. Also note that Multistage DA is only able to improve the matching. In the upload a file in the cloud the admin can process the files. In the admin uploading and the user downloading the files, the admin are going to upload file between them. They can share the uploaded files. User for download files. System showed very good Performance in terms of speed, accuracy, and ease of use. The downloaded files can be automatically stored.The user can download a file details can be viewed by the admin. Fig.1. Management Process International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072
  • 3. © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1056 B. Secure Key Generation Secure Key Processing module generates the random keys to the users and sends those keys to the user’s respective mail, whenever the user gets the key the system asks for the submission of those keys. After submitting the key to the system, it checks the identities of the users whether they are authorized user or not. Fig.2. Generation of Secure Key (KS) C. Client Process The Admin Process can upload a file, the user can search the files.Based on User requirements the admin can upload the files the user can search the files from the admin upload the files. The search time includes fetching the posting list in the index, ordering each entry. Our focus is on top-k retrieval. As the, server can process the top-k retrieval almost as fast as in the plaintext domain. Note that the server does not have to traverse every posting list for each given trapdoor, but instead uses a tree- based data structure to fetch the corresponding list. Therefore, the overall search time cost is almost as efficient as on data. Fig.3. Client Process D. Resource Provisioning An aggressive resource provisioning strategy which encourages to substantially increase the resource allocation in each adaptation cycle when workload increases. The strategy first provisions resources which are possibly more than actual demands, and then reduces the over-provisioned resources if needed this paper proposes, a system that dynamically adjusting the number of virtual machine (VM) instances to ensure the QOS by accelerating the resource provisioning in virtualized cloud computing environments. The key idea behind is exploiting an aggressive strategy, which likely provisions resources that may exceed the actual needs, satisfies the performance requirement at the very beginning of the adaptation process, and then decreases the over provisioned resources if needed. The amount of the resources to be allocated is determined during runtime according to the workload intensity and the amount of provisioned resources rather than a fixed number. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072
  • 4. © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1057 Fig.4. Provisioning the resources IV. CONCLUSION AND FUTURE ENHANCEMENT A. Conclusion Cloud-based media streaming applications in media cloud exhibit high resource consumption on server sides and dynamic traffic flow among media servers. Such characteristics need to be fully considered during the VM placement and migration processes. In this paper, we propose a cluster-aware VM collaborative migration scheme for media cloud, which highly accommodates the characteristics of media streaming under cloud environment. In detail, the proposed scheme simultaneously considers the infrastructure of the DCN and the application resource requirements of media servers. It introduces a generic scheme of VM migration to optimize the internal traffic in media cloud, which tightly integrates clustering, placement, and dynamic migration process. Simulation results demonstrate that the scheme can effectively reduce the total internal traffic of DCN in media cloud. In this study, the proposed scheme does not fully consider the application characters of media streaming to optimize the VM migration in media cloud. B. Future Enhancement The future work should try to devise a collaborative VM migration method focusing on the user experience of media streaming application. Furthermore, due to the limitation of experimental environment, our scheme is just verified on the simulation platform with the self-generated traffic patterns, and the scheme ignores some emergencies such as the failing issue of VM migrations. References [1] Weizhan Zhang, Yuxuan Chen, Xiang Gao, Zhichao Mo, QinghuaZheng,” Cluster-Aware Virtual Machine Collaborative Migration in Media Cloud,” in IEEE Transaction on Parallel and Distributes System, Vol 28, No 10, OCT 2017. [2] M. Al-Fares, A. Loukissas, and A. Vahdat, “A scalable, commodity data center network architecture,” ACM SIGCOMM Computer Communication Review, vol. 38, no. 4, pp. 63–74, 2008. [3] C. Guo, H. Wu, K. Tan, L. Shi, Y. Zhang, and S. Lu, “Dcell: a scalable and fault-tolerant network structure for data centers,” ACM SIGCOMM Computer Communication Review, vol. 38, no. 4, pp. 75–86, 2008. [4] D. Niu, H. Xu, B. Li, and S. Zhao, “Quality-assured cloud bandwidth auto-scaling for video-on-demand applications,” in Proc. of IEEE INFOCOM. IEEE, 2012, pp. 460–468. [5] Y. Zhao, H. Jiang, K. Zhou, Z. Huang, and P. Huang, “Meeting service level agreement cost-effectively for video-on- demand applications in the cloud,” in Proc. of IEEE INFOCOM. IEEE, 2014, pp. 298–306. [6] F. Wang, J. Liu, and M. Chen, “Calms: Cloud-assisted live media streaming for globalized demands with time/region diversities,” in Proc. of IEEE INFOCOM. IEEE, 2012, pp. 199–207. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072
  • 5. © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1058 [7] T. Wood, P. Shenoy, A. Venkataramani, and M. Yousif, “Sandpiper: Black-box and gray-box resource management for virtual machines,” Computer Networks, vol. 53, no. 17, pp. 2923–2938, 2009. [8] V. De Maio, R. Prodan, S. Benedict, and G. Kecskemeti, “Modelling energy consumption of network transfers and virtual machine migration,” Future Generation Computer Systems, vol. 56, pp. 388–406, 2016. [9] J. Zhang, F. Ren, and C. Lin, “Delay guaranteed live migration of virtual machines,” in Proc. of IEEE INFOCOM. IEEE, 2014, pp. 574–582. [10] H. Xu and B. Li, “Egalitarian stable matching for vm migration in cloud computing,” in Proc. of IEEE INFOCOM WKSHPS. IEEE, 2011, pp. 631–636. [11] J. Liu, Y. Li, and D. Jin, “Sdn-based live vm migration across datacenters,” in Proceedings of the 2014 ACM conference on SIGCOMM. ACM, 2014, pp. 583–584. [12] V. Shrivastava, P. Zerfos, K.-W. Lee, H. Jamjoom, Y.- H. Liu, and S. Banerjee, “Application-aware virtual machine migration in data centers,” in Proc. of IEEE INFOCOM. IEEE, 2011, pp. 66–70. [13] T. Yapicioglu and S. Oktug, “A traffic-aware virtual machine placement method for cloud data centers,” in Proceedings of the IEEE/ACM 6th International Conference on Utility and Cloud Computing. IEEE Computer Society, 2013, pp. 299–301. [14] D. S. Dias and L. H. M. Costa, “Online traffic-aware virtual machine placement in data center networks,” in Global Information Infrastructure and Networking Symposium. IEEE, 2012, pp. 1–8. [15] S. Zou, X. Wen, K. Chen, S. Huang, Y. Chen, Y. Liu, Y. Xia, and C. Hu, “Virtualknotter: Online virtual machine shuffling for congestion resolving in virtualized datacenter,” Computer networks, vol. 67, pp. 141–153, 2014. [16] Al-Fares, Alexander Loukissas, Amin Vahdat “A Scalable, Commodity Data Center Network Architecture Mohammad” in IEEE transaction on 2008. [17] R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, “Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility,” Future Generation computer systems, vol. 25, no. 6, pp. 599–616, 2009. [18] Timothy Wood, PrashantShenoy, ArunVenkataramani, MazinYousif“Sandpiper: Black-box and gray-box resource management for virtual machines” in 2009. [19] Vincenzo De Maio, RaduProdan “Modelling Energy Consumption of Network Transfers and Virtual Machine Migration” in IEEE transactions on 2016. [20] UmeshDeshpande, Xiaoshuang Wang, and, KartikGopalan “Live Gang Migration of Virtual Machines” in IEEE transaction on 2011 International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072