Analysis of hybrid cloud approach for private cloud in the de-duplication mechanism

Author(s):  
K. Saritha ◽  
S Subasree
Keyword(s):  
2015 ◽  
Vol 24 (08) ◽  
pp. 1550111 ◽  
Author(s):  
Chunlin Li ◽  
LaYuan Li

The paper proposes hierarchical scheduling optimization scheme in hybrid cloud. Our proposed hierarchical scheduling takes advantage of the interaction of cloud users, private cloud and public cloud. For high level optimization in hybrid cloud, the objective of public cloud provider optimization is to maximize the revenue of providing virtual machines (VMs) and minimize the energy cost. The private cloud users' applications give the unique optimal payment to public cloud providers under deadline and cost constraint to maximize the satisfaction of private cloud user applications. The objective of low-level scheduling optimization is to minimize the cost and execution time of private cloud application. From the simulation results, the revenue, execution success ratio and resource utilization of our proposed hierarchical scheduling algorithm are better than other related works.


Over the last few years the majority of small and large companies moving to cloud computing to develop IT solutions for businesses. It is technology which provides distributed and dynamically shared computing resources using certain operating techniques. In the revolution of information technology, cloud computing is becoming a key paradigm. Cloud computing further classified as Public, Private and Hybrid Cloud. It provides three services which are categorized as Infrastructure-as-Service, Platform-as-Service and Software-as-Service. Open source cloud management platforms providing Infrastructure-as-a-service are now commonly used because of the fastest growth of cloud. Many open source softwares are available for deploying public or private cloud. This paper provides a brief review and comparison of five well-known open source cloud software i.e. OpenNebula, Eucalyptus, OpenStack, Nimbus and CloudStack providing IaaS on the basis of their similar features and technology used. After reviewing the importance and features, we have found OpenStack Cloud Platform is more reliable and useful for the enterprises and organization because of its feature and rapid improvements in its features. The distinction in this paper is believed to help people to choose the suitable open source software according to their need.


Author(s):  
Rajkamal Kaur Grewal ◽  
Pushpendra Kumar Pateriya

Resource provisioning is important issue in cloud computing and in the environment of heterogeneous clouds. The private cloud with confidentiality data configure according to users need. But the scalability of the private cloud limited. If the resources private clouds are busy in fulfilling other requests then new request cannot be fulfilled. The new requests are kept in waiting queue to process later. It take lot of delay to fulfill these requests and costly. In this paper Rule Based Resource Manager proposed for the Hybrid environment, which increase the scalability of private cloud on-demand and reduce the cost. Also set the time for public cloud and private cloud to fulfill the request and provide the services in time. The Evaluated the performance of Resource Manager on the basis of resource utilization and cost in hybrid cloud environment.


Author(s):  
Jiuling Zhang ◽  
Shijun Shen ◽  
Daochao Huang

AbstractThe security issue is becoming more and more prominent since user’s private information being outsourced to the somewhat untrustworthy cloud. Encrypting the information before uploading them to the cloud is one of ultimate solutions. Secure searchable encryption schemes and secure ranking schemes have been proposed to help retrieving the most relevant documents over the cloud. However the present methods are encumbered by the huge computing and communicating occupation of the cipher text. In this paper, a fully homomorphic encryption based secure ranked search model over the hybrid cloud is proposed. By introducing hybrid cloud, which typically composed by private cloud and public cloud, the high cost of computing and communicating of the cipher text is transferred to the trustworthy private cloud, in which the decrypting are performed. The client does not need to perform any heavy computations, thence making the secure ranking practical from the client’s point of view.


Author(s):  
In Lee

Abstract While the rapid growth of cloud computing is driven by the surge of big data, the Internet of Things, and social media applications, an evaluation and investment decision for cloud computing has been challenging for corporate managers due to a lack of proper decision models. This paper attempts to identify critical variables for making a cloud capacity decision from a corporate customer’s perspective and develops a base mathematical model to aid in a hybrid cloud investment decision under probabilistic computing demands. The identification of the critical variables provides a means by which a corporate customer can effectively evaluate various cloud capacity investment opportunities. Critical variables included in this model are an actual computing demand, the amount of private cloud capacity purchased, the purchase cost of the private cloud capacity, the price of the public cloud, and the default downtime loss/penalty cost. Extending the base model developed, this paper also takes into consideration the interoperability cost incurred in cloud bursting to the public cloud and derives the optimal investment. The interoperable cloud systems require time and investment by the users and/or cloud providers and there exists a diminishing return on the investment. Hence, the relationship between the interoperable cloud investment and return on investment is also investigated.


2017 ◽  
Vol 26 (04) ◽  
pp. 1750005 ◽  
Author(s):  
Xu Lijun ◽  
Li Chunlin

The paper presents a hybrid cloud service provisioning and selection optimization scheme, and proposes a hybrid cloud model which consists of hybrid cloud users, private cloud and public cloud. This scheme aims to effectively provide cloud service and allocate cloud resources, such that the system utility can be maximized subject to public cloud resource constraints and hybrid cloud users constraints. The paper makes use of a utility-driven approach to solve interaction among private cloud user, hybrid cloud service provider and public cloud provider in hybrid cloud environment. The paper presents hybrid cloud service provisioning and selection algorithm in hybrid cloud. The hybrid cloud market consists of hybrid cloud user agent, hybrid cloud service agent and hybrid cloud agent, which represent the interests of different roles. The experiments are designed to compare the performance of proposed algorithm with the other related work.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Sridhar Reddy Vulapula ◽  
Srinivas Malladi

PurposeHybrid cloud composing of public and private cloud is seen as a solution for storage of health care data characterized by many private and sensitive data. In many hybrid cloud-based solutions, the data are perturbed and kept in public cloud, and the perturbation credentials are kept in private cloud.Design/methodology/approachHybrid cloud is a model combing private and public cloud. Security for the data is enforced using this distribution in hybrid clouds. However, these mechanisms are not efficient for range query and retrieval of data from cloud. In this work, a secure and efficient retrieval solution combining K-mean clustering, geometric perturbation and R-Tree indexing is proposed for hybrid clouds.FindingsCompared to existing solution, the proposed indexing on perturbed data is able to achieve 33% reduced retrieval time. The security of indexes as measured using variance of differences was 66% more than existing solutions.Originality/valueThis study is an attempt for efficient retrieval of data with range queries using R-Tree indexing approach.


2017 ◽  
Vol 2017 ◽  
pp. 1-15 ◽  
Author(s):  
Xiaolong Xu ◽  
Xuan Zhao ◽  
Feng Ruan ◽  
Jie Zhang ◽  
Wei Tian ◽  
...  

Nowadays, a large number of groups choose to deploy their applications to cloud platforms, especially for the big data era. Currently, the hybrid cloud is one of the most popular computing paradigms for holding the privacy-aware applications driven by the requirements of privacy protection and cost saving. However, it is still a challenge to realize data placement considering both the energy consumption in private cloud and the cost for renting the public cloud services. In view of this challenge, a cost and energy aware data placement method, named CEDP, for privacy-aware applications over big data in hybrid cloud is proposed. Technically, formalized analysis of cost, access time, and energy consumption is conducted in the hybrid cloud environment. Then a corresponding data placement method is designed to accomplish the cost saving for renting the public cloud services and energy savings for task execution within the private cloud platforms. Experimental evaluations validate the efficiency and effectiveness of our proposed method.


Techno Com ◽  
2018 ◽  
Vol 17 (4) ◽  
pp. 404-414
Author(s):  
Toga Aldila Cinderatama ◽  
Yoppy Yunhasnawa ◽  
Rinanza Zulmy Alhamri

Dalam implementasi big data biasanya membutuhkan sumber daya yang cukup besar untuk dapat melakukan analisis terhadap data-data yang jumlahnya sangat besar tersebut, hal ini biasanya menjadi kendala dikarenakan keterbatasan sumber daya yang dimiliki. Komputasi awan (cloud computing) yang salah satunya mempunyai sifat elasticity di dalamnya, menawarkan solusi keterbatasan sumber daya ini. Sumber daya yang terbatas misalkan dalam hal processor, RAM atau storage, dapat digabungkan dengan sumber daya yang dimiliki public cloud provider yang tersedia di market. Sehingga penggabungan 2 sumber daya ini, private cloud dan public cloud, diharapkan menjadi solusi untuk dapat mengimplementasikan analisis big data yang dapat diterapkan untuk analisis berbagai macam bidang. Secara umum penelitian ini bertujuan untuk mengimplementasikan hybrid cloud yang menggabungkan sumber daya dari private cloud dengan sumber daya dari public cloud sebagai infrastruktur untuk analisis big data. Secara khusus tujuan penelitian ini adalah merumuskan sebuah metode minimalisasi cost dalam pemilihan public cloud dengan pendekatan sistem pendukung keputusan menggunakan Fuzzy AHP pada pemilihan public cloud. Langkah pertama yang dilakukan dalam penelitian ini adalah pengumpulan data cost penggunaan resource dari public cloud. Selanjutnya dilakukan analisis kebutuhan sumber daya yang diperlukan untuk melalukan analisis big data dengan studi kasus topik tertentu. Selanjutnya tahap analisis terhadap pemilihan public cloud yang tepat untuk digunakan sumber dayanya dengan pertimbangan minimalisasi cost. Langkah terakhir adalah implementasi hybrid cloud dan melakukan analisis dan evaluasi terhadap metode yang diusulkan.


Big Data refers to large volume of data and necessitates the usage of cloud for storage and processing. Cloud tenants data is not only stored in the cloud, but it is also shared among multiple users. The data stored in cloud must be well protected as it is prone to malicious attacks and hardware failures. Also, user’s data on cloud contain sensitive information that must be protected and highly restricted from unauthorized access. Cloud deployment models such as public cloud, private cloud, and hybrid cloud can be used for storing data of cloud tenants. This paper proposes a secured storage approach for protecting data in cloud by partitioning big dataset into blocks containing user’s sensitive data, insensitive data, and public data. Sensitive data is moved to private cloud and is well protected using proxy re encryption. Insensitive data is stored in public cloud and some data blocks are randomly encrypted. Also, the storage index information of insensitive data blocks on cloud is encrypted and shared among authorized users. Public data is also moved to public cloud and to protect it the storage path information is only encrypted and shared. The proposed approach shows better results with reduced computation overhead and improved security.


Sign in / Sign up

Export Citation Format

Share Document