scholarly journals Performance Analysis of Load Balancing Algorithms using Microsoft Windows Azure Cloud Platform

As we are living in technology dominating era, the role of cloud computing as one of the rapidly emerging technologies is highly indispensable. This cloud computing holds load distribution concept, which is usually addressed as a challenging phenomenon, to handle multiple requests which are coming from geographically differentiated locations. There are various load balancing mechanisms exits for the effective distribution of the work load. This load balancing mechanism takes the advent of the virtualization approach on resources to optimize the utilization of the resources. In virtualization, the creation of virtual machine and mapping the same to the suitable request makes the cloud computing a prominent technology. This paper work considers various load balancing mechanisms for the allocation of resources and also shows a comparative study on them with the help of an example scenario. These load balancing algorithms are applied on applications like real-time systems and prioritized medical field related data storage system. This research work is implemented in Windows Azure Platform as Cloud Operation System under load balancing component.

2020 ◽  
Vol 12 (5) ◽  
pp. 1-9
Author(s):  
Telesphore Tiendrebeogo ◽  
Mamadou Diarra

The Big Data is unavoidable considering the place of the digital is the predominant form of communication in the daily life of the consumer. The control of its stakes and the quality its data must be a priority in order not to distort the strategies arising from their treatment in the aim to derive profit. In order to achieve this, a lot of research work has been carried out companies and several platforms created. MapReduce, is one of the enabling technologies, has proven to be applicable to a wide range of fields. However, despite its importance recent work has shown its limitations. And to remedy this, the Distributed Hash Tables (DHT) has been used. Thus, this document not only analyses the and MapReduce implementations and Top-Level Domain (TLD)s in general, but it also provides a description of a model of DHT as well as some guidelines for the planification of the future research.


2014 ◽  
Vol 635-637 ◽  
pp. 1471-1475
Author(s):  
Hai Yan Chen

In the context of the wide application of cloud computing technology, Internet crimes with the support of such technology will increase. In this article, the author proposed a holistic set of digital forensics method applicable in could computing environment from the point of the four stages of digital evidence collection, preservation, analysis and presentation. In evidence collection session, original resource of electric data collection was discussed. In evidence preservation session, electronic data storage system on Hadoop was designed. In evidence analysis session, two types of crime data were analyzed. In evidence presentation session, what the result should be shown were explained.


Author(s):  
Muhammad Usman Ashraf

Cloud computing is one of the ruling storage solutions. However, the cloud computing centralized storage method is not stable. Blockchain, on the other hand, is a decentralized cloud storage system that ensures data security. Cloud environments are vulnerable to several attacks which compromise the basic confidentiality, integrity, availability, and security of the network. This research focus on decentralized, safe data storage, high data availability, and effective use of storage resources. To properly respond to the situation of the blockchain method, we have conducted a comprehensive survey of the most recent and promising blockchain state-of-the-art methods, the P2P network for data dissemination, hash functions for data authentication, and IPFS (InterPlanetary File System) protocol for data integrity. Furthermore, we have discussed a detailed comparison of consensus algorithms of Blockchain concerning security. Also, we have discussed the future of blockchain and cloud computing. The major focus of this study is to secure the data in Cloud computing using blockchain and ease for researchers for further research work.


2018 ◽  
Vol 22 (23) ◽  
pp. 7763-7772 ◽  
Author(s):  
Yinghui Zhang ◽  
Menglei Yang ◽  
Dong Zheng ◽  
Pengzhen Lang ◽  
Axin Wu ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document