Cloud computing plays important role in the development of IT industry. It can help a small organization to headway their business. An organization can progress from small scale industry to large scale industry. "Cloud" basically internet based data, network, resource storage. Meanwhile security, integrity, confidentiality requirement need must be achieve by cloud implementation. Attribute based encryption policy provides efficient encryption of data. Hierarchical implementation implies that an organization able to assign different privileges to users according to their role, using a top to bottom approach. Cloudsim has made virtual environment of cloud for developers. It connects to virtual resources according to user requirement of network resources. This paper describes the implementation of Hierarchical attribute base encryption scheme on cloudsim tool. Implementing attribute based encryption where rijndael algorithm used to encrypt data. Also paper include efficiency of encryption and decryption scheme used in implementation
Cloud computing is a rising technology in distributed computing. Cloud computing is one of the latest technology. Cloud is developing day by day and focuses on many challenges one of the most important is scheduling. Main objective of scheduling algorithm is to make proper utilization of the resources. The Goal of this project is to apply the scheduling algorithm in public cloud to execute the given no of tasks within deadline and budget cost. Here PBACO algorithm is used to solve optimization problem and to achieve the global optimal path and avoid the local optima. The simulation result shows the algorithm reduces the execution time and user budget cost. The algorithm completes all task execution with Minimum makespan and minimum cost using the Cloudsim. General TermsCloud computing, scheduling algorithm, task Scheduling.
The popularity and widespread use of Cloud have brought great convenience for data sharing and data storage. The data sharing with a large number of participants take into account issuers like data integrity, efficiency and privacy of the owner for data. In cloud storage services one critical challenge is to manage ever-increasing volume of data storage in cloud. To make data management more scalable in cloud computing field, deduplication a well-known technique of data compression to eliminating duplicate copies of repeating data in storage over a cloud. Even if data deduplication brings a lot of benefits in security and privacy concerns arise as user's sensitive data are susceptible to both attacks insider and outsider. A convergent encryption method enforces data confidentiality while making deduplication feasible. Traditional deduplication systems based on convergent encryption even though provide confidentiality but do not support the duplicate check on basis of differential privileges. This paper presents, the idea of authorized data deduplication proposed to protect data security by including differential privileges of users in the duplicate check. Deduplication systems, users with differential privileges are further considered in duplicate check besides the data itself. To support stronger security the files are encrypted with differential privilege keys. Users are only allowed to perform the duplicate check for files marked with the corresponding privileges to access. The user can verify his/her presence of file after deduplication in cloud with the help of a third party auditor by auditing the data. Further auditor audits and verifies the uploaded file on time. Therefore, this paper creates benefits to both the storage provider and user by deduplication technique and auditing technique respectively. General TermsDeduplication, hybrid cloud, Cloud security.
The cloud computing is an Internet-based computing emerging as a new architecture which aims to give reliable, customizable and QoS guaranteed dynamic environment for end-users. As multi-tenancy is one of the key features of cloud computing where service providers and users have scalable and economic benefits on same cloud platforms. In cloud computing environment the execution process requires resource management due to the processing capability is high to the resource ratio. The aim of the system is to handle resource management by executing scientific workflows. The locating and assigning of free resources is handled through the Cloud-based Workflow Scheduling Algorithm (CWSA) policy. The simulation results shows that the scheduling algorithm improves the performance of scientific workflows and helps in minimization of workflow completion time, tardiness, execution cost and use of idle resources of cloud using simulator Workflowsim.
Cloud Computing has Large Scale Distributed Infrastructure which is accessible and scalable infrastructure. Cloud computing provides a pay as you go model in which the user has to pay for the services he uses. One of the characteristic of cloud is elasticity in which resources can be dynamically increases or decreases as per user requirement. The goal of this project is to execute the scientific workflows in public cloud within user define deadline and smallest possible cost. The deadline of the project can be meeting by provisioning more virtual machines that required. The algorithm Enhanced ICPCP uses the concept partial critical path which is defined in the ICPCP. The simulation result shows the algorithm reduces the execution time of different scientific workflows simulated using the cloudsim.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.