Conference Papers
Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506
Browse
4 results
Search Results
Item An approach for dynamic scaling of resources in enterprise cloud(IEEE Computer Society, 2013) Kanagala, K.; Chandra Sekaran, K.Elasticity is one of the key governing properties of cloud computing that has major effects on cost and performance directly. Most of the popular Infrastructure as a Service (IaaS) providers such as Amazon Web Services (AWS), Windows Azure, Rack space etc. work on threshold-based auto-scaling. In current IaaS environments there are various other factors like "Virtual Machine (VM)-turnaround time", "VM-stabilization time" etc. that affect the newly started VM from start time to request servicing time. If these factors are not considered while auto-scaling, then they will have direct effect on Service Level Agreement (SLA) implementations and users' response time. Therefore, these thresholds should be a function of load trend, which makes VM readily available when needed. Hence, we developed an approach where the thresholds adapt in advance and these thresholds are functions of all the above mentioned factors. Our experimental results show that our approach gives the better response time. © 2013 IEEE.Item A framework to monitor cloud infrastructure in service oriented approach(2013) Veigas, J.P.; Chandra Sekaran, K.Cloud computing processes and stores the organization's sensitive data in the third party infrastructure. Monitoring these activities within the cloud environment is a major task for the security analysts and the cloud consumer. The cloud service providers may voluntarily suppress the security threats detected in their Infrastructure from the consumers. The goal is to decouple Intrusion Detection System (IDS) related logic from individual application business logic and adhere to the Service Oriented Architecture Standards. This paper provides a framework for Intrusion Detection and reporting service to the cloud consumers based on the type of applications and their necessary security needs. Cloud consumers can choose the desired signatures from this framework to protect their applications. The proposed technique is deployed in existing open source cloud environment with minimum changes. A proof-of-concept prototype has been implemented based on Eucalyptus open source packages to show the feasibility of this approach. Our results show that this framework provides effective way to monitor the cloud infrastructure in service oriented approach. © 2013 IEEE.Item Analysis of emerging workflow scheduling algorithms in cloud(Institute of Electrical and Electronics Engineers Inc., 2016) Raghavan, S.; Chandrasekaran, K.Workflow has a great impact on several diverse fields of science such as Physics, Bioinformatics, Astronomy etc. The computational requirements of the world is increasing exponentially and so the use of workflows. These requirements are expected to increase by many folds. Thus workflow can be considered as one of the important areas to be explored. Workflow is used extensively by the scientific community for automation. Similarly these workflows have a significant impact on grid computing, cloud computing and other distributed environments. Moreover it is because of grid computing technology that power of workflow is realizable. Similarly cloud computing also supports workflows. Workflow scheduling is considered to be the core when it comes to workflow thus it is highly important to know what are workflow scheduling algorithms available for scheduling workflow in cloud. This paper gives an overview about workflow, the impact of workflows on cloud and other important issues related to it are presented. This paper primarily focuses on Workflow scheduling algorithms in cloud and analysis of the same is presented. © 2015 IEEE.Item Survey on Optimization in IoT(Institute of Electrical and Electronics Engineers Inc., 2018) Chenna Keshava, B.S.; Srinivasan, C.K.This paper gives a brief overview of the existing literature on Optimization in Internet of Things (IoT), which is a very critical technology in the 21stcentury. A few of the papers deal with the evolution of IoT as a technology in the past 20 years, whereas a majority of the papers deal with the challenges faced in the communication, modelling and deployment of IoT applications, few of which use optimization and which are exploding in their numbers and the diversity of the type of devices. © 2018 IEEE.
