A Result Base on Various Approaches of Load Balancing in Cloud Computing
Keywords:
job scheduling, Directed Acyclic Graph, implement Min-Min, Shortest Job FirstAbstract
In this paper we are studied cloud computing techniques. The Homomorphic property of various cryptosystems can be used to create secure voting systems, collision-resistant hash functions, and private information retrieval schemes and enable widespread use of cloud computing by ensuring the confidentiality of processed data.
References
Amir Nahir “Distributed Oblivious Load Balancing Using Prioritized Job Replication”, ISSN 978-3-901882-48-7, IEEE, 2012.
Hong Tao “A dynamic data allocation method with improved load-balancing for cloud storage system”, ISSN 978-1-84919-707-6, PP 220 – 225, IEEE, 2013
Yuqi Zhang “Dynamic load-balanced multicast based on the Eucalyptus open-source cloud-computing system”,ISSN 978-1-61284-158-8, pp. 456 – 460, IEEE,2011.
Magade, Krishnanjali A. “Techniques for load balancing in Wireless LAN's”, ISSN 978-1-4799-3357-0, PP 1831 – 1836, IEEE, 2014.
Yean-Fu Wen “Load balancing job assignment for cluster-based cloud computing”, ISSN 14517061, PP 199 – 204, IEEE, 2014.
De Mello, M.O.M.C “Load balancing routing for path length and overhead controlling in Wireless Mesh Networks”, ISSN 14630778, PP 1-6, IEEE, 2014.
R. Angel Preethima, Margret Johnson, “Survey on Optimization Techniques for Task Scheduling in Cloud Environment”, IJARCSSE, Volume 3, Issue 12, December 2013.
Ahmed DheyaaBasha, Irfan Naufal Umar, and Merza Abbas, Member, IACSIT “Mobile Applications as Cloud Computing: Implementation and Challenge”, 7865-7564, IEEE, 2013.
Alabbadi, M.M“ Cloud computing for education and learning: Education and learning as a service (ELaaS)”, ISSN 978-1-4577-1748-2, PP 589 – 594, IEEE,2011.
Cong Wang, Qian Wang, Kui Ren and Wenjing Lou “Ensuring Data Storage Security in Cloud Computing.” IEEE 2009.
Farzad Sabahi, “Cloud Computing Security Threats and Responses," IEEE Trans. on Cloud Computing., vol. 11, no. 6, pp. 670 { 684, 2002.}
Gaurav Raj, Dheerendra Singh, Abhay Bansal, “Using Batch Mode Heuristic Priority in Round Robin (PBRR) Scheduling”, IEEE, 2012.
Jianfeng Yang, Zhibin Chen “Cloud Computing Research and Security Issues” Vol. 978-1-4244-5392-4/10/$26.00 ©2010 IEEE
Jaber, A.N. “Use of cryptography in cloud computing”, ISSN978-1-4799-1506-4,PP 179 – 184,IEEE,2013.
Kalagiakos, P. Karampelas, P “Cloud computing learning” 978-1-61284-831-0, 1 – 4, IEEE, 2011.
Mehmet Yildiz, Jemal Abawajy, Tuncay Ercan and Andrew Bernoth “A Layered Security Approach for Cloud Computing Infrastructure” 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks. © 2009 IEEE.
Md. Imrul Kayeset al. “Test Case Prioritization for Regression Testing Based on Fault Dependency” ISSN 978-1-4244-8679-3/11, IEEE, 2013
Mohammed Achemlal, Saıd Gharoutand Chrystel Gabber “Trusted Platform Module as an Enabler for Security in Cloud Computing” Vol. 978-1-4577-0737-7/11/$26.00 ©2011 IEEE.
Sravan Kumar R, AshutoshSaxena “Data Integrity Proofs in Cloud Storage” Vol. 978-0-7695-4355-0/11 $26.00 © 2011 IEEE.
Qiang Guan, Chi-Chen Chiu, Song Fu “A Cloud Dependability Analysis Framework for Characterizing System Dependability in Cloud Computing Infrastructures”, ISSN 978-1-4673-4849-2, 11 – 20, IEEE, 2012.
RuWei Huang, Si Yu, Wei Zhuang and Xiao Lin Gui, “Design of Privacy-Preserving Cloud Storage Framework" 2010 Ninth International Conference on Grid and Cloud Computing.
RuWei Huang, Si Yu, Wei Zhuang and Xiao Lin Gui, “Research on Privacy-Preserving Cloud Storage Framework Supporting Cipher text Retrieval" 2011 Ninth International Conference on Grid and Cloud Computing.
Ranjita Mishra, Sanjit Kumar Dash “A Privacy Preserving Repository for Securing Data across the Cloud” Vol 978-1-4244-8679-3/11/$26.00 ©2011 IEEE
Ryan K. L. Ko, Markus Kirch berg, Bu Sung Lee “From System-centric to Data-centric Logging –Accountability, Trust & Security in Cloud Computing” IEEE Computer Society, 2011.
Sang-Ho Na, Jun-Young Park, Eui-Nam Huh “Personal Cloud Computing Security Framework” 2010 IEEE Asia-Pacific Services Computing Conference.
Akhil Goyal, Bharti, “A Study of Load Balancing in Cloud Computing using Soft Computing Techniques ”, International Journal of Computer Applications (0975 – 8887)
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
