3 research outputs found

    Optimized Load Balancing based Task Scheduling in Cloud Environment

    Get PDF
    The fundamental issue of Task scheduling is one important factor to load balance between the virtual machines in a Cloud Computing network. However, the optimal broadcast methods which have been proposed so far focus only on cluster or grid environment. In this paper, task scheduling strategy based on load balancing Quantum Particles Swarm algorithm (BLQPSO) was proposed. The fitness function based minimizing the makespan and data transmission cost. In addition, the salient feature of this algorithm is to optimize node available throughput dynamically using MatLab10A software. Furthermore, the performance of proposed algorithm had been compared with existing PSO and shows their effectiveness in balancing the load

    Emerging Trends in Safety Issues in Cloud - The Potentials of Threat Model

    Get PDF
    For tomorrow�s computing, Cloud computing has designed the unrealistic and infrastructural basis. The complete computing infrastructure is quickly affecting cloud based architecture. Via Internet, the resources and services of cloud computing are offered and also these services and resources are offered from data centers located globally. By providing resources that are virtual through the internet, cloud computing controls its consumers. With a continuous matter for Open Systems and internet, Security has always concerned. It really suffers whenever we are discussing about security on cloud. The lack of safety is the only hindrance in general implementation of cloud computing. The flexibility and benefits, if security is not robust and consistent, that cloud computing has to offer, will have slight rationality. There are many security problems that are enclosed in cloud computing such as security of data, and investigation of the utilization by the cloud computing merchants. For the consumers and service providers, the prosperous in cloud computing includes lots of security challenges. The objective of this paper is to recognize the most insecure threats of security in cloud computing which will further enables both end users and retailers to know about the key security threats that are linked with cloud computing. It also includes finding of advantages and problems in cloud computing with respect to availability of data, its cost and security of data
    corecore