Evaluating Synchronized Determination Assembly in Multi-Cloud Atmosphere
Keywords:
Cloud Computing, Cloud association provider(CSP), Proxy, SaaS, IaaS, PaaSAbstract
Cloud handling has emerged as a prominent paradigm that offers handling resources (e.g. CPU, storage, bandwidth, software) as scale capable also, on-demo, organizations over the Internet. As more players enter this rising market, a heterogeneous cloud handling market is anticipated to evolve, where individual players will have specific volumes of resources, also, will give specialized services, also, with specific levels of quality of services. It is anticipated that association suppliers will thus, besides competing, too collaborate to complement their resources in request to move forward asset use also, combine individual organizations to offer more complex esteem chains also, end-to-end arrangements required by the customers. In this paper we investigate the capacity of joint effort structure in cloud handling environments. This joint effort will be driven by the developing need to offer assorted organizations without having to spend heavily on infrastructure. Coordinated effort can be a boon to all cloud association suppliers in a way that the customers would have on offer a consolidated catalogue of all partnering CSPs.
References
Sang Jun Park ; Dept. of Comput. Sci., Indiana Univ.-Purdue Univ., Fort Wayne, IN, USA ; Jin Soung Yoo” Leveraging cloud computing for spatial association mining” Published in: Systems, Man and Cybernetics (SMC), 2014 IEEE International Conference on Date of Conference:5-8 Oct. 2014 Page(s):4152 – 4153.
Wang Yong ; Dept. of Comput. Sci. & Eng., Guilin Univ. of Electron. Technol., Guilin, China ; Zhang Zhe ; Wang Fang” A parallel algorithm of association rules based on cloud computing” Published in:Communications and Networking in China (CHINACOM), 2013 8th International ICST Conference on Date of Conference:14-16 Aug. 2013 Page(s):415 – 419.
Xueyan Huang ; Wireless Signal Process. & Network Lab., Beijing Univ. of Posts & Telecommun., Beijing, China ; Yong Li ; Gang Chuai ; Mugen Peng” Work in progress: Dynamic resource allocation and user association for heterogeneous cloud cellular networks” Published in:Communications and Networking in China (CHINACOM), 2014 9th International Conference on Date of Conference: 14-16 Aug. 2014Page(s):474 – 477.
Zhao-hong Wang ; Dept. of Comput. Sci. & Technol., Weifang Univ., Weifang, China Quantitative Association Rules MiningMethod Based on Trapezium Cloud Model Published in: Database Technology and Applications (DBTA), 2010 2ndInternational Workshop on Date of Conference:27-28 Nov. 2010Page(s):1 – 4.
Zhihui Zhou ; Coll. of Comput. Sci. & Technol., Jilin Univ., Changchun, China ; Guixia Liu ; Lingtao Su ; Lun Yan” CChi: An efficient cloud epistasis test model in human genome wide association studies” Published in: Biomedical Engineering and Informatics (BMEI), 2013 6th International Conference on Date of Conference:16-18 Dec. 2013Page(s):787 – 791.
Sunitha, N.R. ; Dept. of Comput. Sci. &Eng., Siddaganga Inst. of Technol., Tumkur ; Amberker, B.B.” Forward-Secure Proxy Signature Scheme for Multiple Proxy Signers using DSA with Proxy Revocation” Published in:Advance Computing Conference, 2009. IACC 2009. IEEEInternational Date of Conference:6-7 March 2009Page(s):681 – 686.
Jindan Zhang ; Dept. of Electron. Inf., Xianyang Vocational Tech. Coll., Xianyang ; Xu An Wang” Non-transitive Bidirectional Proxy Re-encryption Scheme” Published in: Networking and Digital Society, 2009. ICNDS '09. InternationalConference on (Volume:1 )Date of Conference: 30-31 May 2009 Page(s):213 – 216.
Liu Wen-Yuan ; Yanshan Univ., Qinhuangdao ; Tong Feng ; Luo Yong-An ; Zhang Feng” A Proxy Blind Signature Scheme Based on Elliptic Curve with Proxy Revocation” Published in: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2007. SNPD 2007. Eighth ACIS International Conference on (Volume:1 )Date of Conference: July 30 2007-Aug.1 2007 Page(s):99 – 104.
Iuon-Chang Lin ; Dept. of Manage. Inf. Syst., Nat. Chung Hsing Univ., Taichung ; Chin-Chen Chang ; Jen-Ho Yang” An Efficient Proxy Signature Scheme for Realizing Generalized Proxy Signing Policy” Published in: Intelligent Information Hiding and Multimedia Signal Processing, 2008. IIHMSP '08 International Conference on Date of Conference:15-17 Aug. 2008 Page(s):1537 – 1540.
Fengying Li ; Dept. of Educ. Inf. Technol., East China Normal Univ., Shanghai, China ; Qingshui Xue ; Jiping Zhang ; Zhenfu Cao” About the security for HW threshold proxy signature scheme with self-certified public key system” Published in:Communications and Networking in China, 2009. ChinaCOM 2009. Fourth International Conference onDate of Conference:26-28 Aug. 2009Page(s):1 – 5
Songqing Chen ; Dept. of Comput. Sci., Coll. of William & Mary, Williamsburg, VA ; Bo Shen ; Wee, S. ; Xiaodong Zhang” Designs of high quality streaming proxy systems” Published in: INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies (Volume:3 ) Date of Conference:7-11 March 2004 Page(s):1512 - 1521 vol.3
Bu Sung Lee ; HP Labs. Singapore, Singapore, Singapore ; Shixing Yan ; Ding Ma ; Guopeng Zhao” Aggregating IaaS Service” Published in:SRII Global Conference (SRII), 2011 Annual Date of Conference:March 29 2011-April 2 2011 Page(s):335 – 338.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
