Full Paper View Go Back

Simultaneous optimization of replica in multi-cloud simulation

Sunny Bhadlawala1 , S.S. Srivastava2

  1. Dept. of CSE, AISECT UNIVERSITY, Bhopal, India.
  2. Dept. of CSE, AISECT UNIVERSITY, Bhopal, India.

Section:Research Paper, Product Type: Isroset-Journal
Vol.6 , Issue.2 , pp.129-133, Apr-2018


CrossRef-DOI:   https://doi.org/10.26438/ijsrcse/v6i2.129133


Online published on Apr 30, 2018


Copyright © Sunny Bhadlawala, S.S. Srivastava . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Sunny Bhadlawala, S.S. Srivastava, “Simultaneous optimization of replica in multi-cloud simulation,” International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.2, pp.129-133, 2018.

MLA Style Citation: Sunny Bhadlawala, S.S. Srivastava "Simultaneous optimization of replica in multi-cloud simulation." International Journal of Scientific Research in Computer Science and Engineering 6.2 (2018): 129-133.

APA Style Citation: Sunny Bhadlawala, S.S. Srivastava, (2018). Simultaneous optimization of replica in multi-cloud simulation. International Journal of Scientific Research in Computer Science and Engineering, 6(2), 129-133.

BibTex Style Citation:
@article{Bhadlawala_2018,
author = {Sunny Bhadlawala, S.S. Srivastava},
title = {Simultaneous optimization of replica in multi-cloud simulation},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {4 2018},
volume = {6},
Issue = {2},
month = {4},
year = {2018},
issn = {2347-2693},
pages = {129-133},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=621},
doi = {https://doi.org/10.26438/ijcse/v6i2.129133}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i2.129133}
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=621
TI - Simultaneous optimization of replica in multi-cloud simulation
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Sunny Bhadlawala, S.S. Srivastava
PY - 2018
DA - 2018/04/30
PB - IJCSE, Indore, INDIA
SP - 129-133
IS - 2
VL - 6
SN - 2347-2693
ER -

435 Views    225 Downloads    116 Downloads
  
  

Abstract :
In this research paper, we analyze the replication and data partitions, if at any time a master replica has been set to handle all requests, we`ve talked about servers with high availability and primarily backup plans in their database. On the other hand, if a replication process a request and then redistributes it, it is a multi-primary plan. Transactional replication typically integrates server-to-server scenarios used in the report data from multiple sites would need to integrate high throughput, including improved scalability and availability, Data warehousing and heterogeneous data. Cloud computing is a set of security-control-based technologies and policies that comply with regulatory compliance rules and protect information related to cloud computing, data applications, and infrastructure. To transfer the current server cloud provider to another provider, the security should work according to the following numbers.

Key-Words / Index Term :
Cloud computing Replica, Data Segmentation, unicast, any cast, multicast, and cloudsim

References :
[1]. Cong Wang, Sherman S.M. Chow, Qian Wang, Kui Ren, Wenjing Lou, “Privacy-Preserving Public Auditing for Secure Cloud Storage”, IEEE TRANSACTIONS ON COMPUTERS, VOL. 62, NO. 2, FEBRUARY 2013
[2]. Nancy J. King, V.T. Raja, “Protecting the privacy and security of sensitive customer data in the cloud”, computer law & security review28(2012)308e319
[3]. Abhishek Mohta ,Ravi Kant Sahu,Lalit Kumar Awasthi, “Robust Data Security for Cloud while using Third Party Auditor“,International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 2, February 2012
[4]. Ronnie D. Caytiles and Sunguk Lee, “Security Considerations for Public Mobile Cloud Computing ”, international Journal of Advanced Science and Technology Vol. 44, July, 2012
[5]. Kangchan Lee, “Security Threats in Cloud Computing Environments”, International Journal of Security and Its Applications Vol. 6, No. 4, October, 2012
[6]. Abdul Nasir Khan, M.L. Mat Kiah, Samee U. Khan, Sajjad A. Madani, “Towards secure mobile cloud computing: A survey”, Contents lists available at SciVerseScienceDirect Future Generation Computer Systems
[7]. Cong Wang, Qian Wang, Kui Ren, Ning Cao, Wenjing Lou, “Towards Secure and Dependable Storage Services in Cloud Computing”, IEEE Transactions on Cloud Computing Date of Publication: April-June 2012 Volume: 5 , Issue: 2
[8]. M. K. F. H. Judith Hurwitz, Robin Bloor, “Cloud computing for dummies,” http://www.dummies.com/how-to/content/ cloud-computing-standards-organizations.html.
[9]. J. Han, W. Susilo, and Y. Mu, “Identity-based data storage in cloud computing,” Future Generation Computer Systems, vol. 29, no. 3, pp. 673–681, 2013.
[10]. L. M. Kaufman, “Data security in the world of cloud computing,” Security & Privacy, IEEE, vol. 7, no. 4, pp. 61–64, 2009.
[11]. C. Cachin, I. Keidar, and A. Shraer, “Trusting the cloud,” AcmSigact News, vol. 40, no. 2, pp. 81–86, 2009.
[12]. P. Kumar and H. S. Arri, “Data location in cloud computing,” International Journal for Science and Emerging Technologies with Latest Trends, vol. 5, no. 1, pp. 24–27, 2013.
[13]. “IBM-Uncovers-Encryption-Scheme-That-Could-Improve-Cloud-Security,” http://www.eweek.com/c/a/Security/IBM-Uncovers-Encryption-Scheme-/ That-Could-Improve-Cloud-Security-Spam-Filtering-135413.
[14]. K. P. Puttaswamy, C. Kruegel, and B. Y. Zhao, “Silverline: toward data confidentiality in storageintensive cloud applications,” in Proceedings of the 2nd ACM Symposium on Cloud Computing, p. 10, 2011.
[15]. A. S. Team et al., “Amazon s3 availability event: July 20, 2008,” See: http://status. aws. amazon. com/s3-20080720. html, 2008.
[16]. K. Sharma and K. R. Singh, “Online data back-up and disaster recovery techniques in cloud computing: A review,” International Journal of Engineering and Innovative Technology (IJEIT), vol. 2, no. 5, pp. 249–254, 2012.
[17]. EmanM.Mohamed, Hatem S. Abdelkader, “Enhanced Data Security Model for Cloud Computing”, The 8th International Conference on INFOrmatics and Systems (INFOS2012) - 14-16 May
[18]. K. R. C. Wang, Q. Wang and W. Lou, “Ensuring data storage security in cloud computing,” in Proc. 17th International Workshop on Quality of Service (IWQoS ’09), pp. 1–9, 2009. N. I. of Standards and Technology (NIST). http://www.nist.gov/itl/cloud/.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation