A Novel Secured Data Transmission Model with Load Balancing for Cloud Computing

  IJCOT-book-cover
 
International Journal of Computer & Organization Trends  (IJCOT)          
 
© 2016 by IJCOT Journal
Volume - 6 Issue - 1
Year of Publication : 2016
AuthorsN.Madhavi Latha, Y.Pavan Narasimha Rao
  10.14445/22492593/IJCOT-V29P304

MLA

N.Madhavi Latha, Y.Pavan Narasimha Rao"A Novel Secured Data Transmission Model with Load Balancing for Cloud Computing", International Journal of Computer & organization Trends (IJCOT), V6(1):45-50 Jan - Feb 2016, ISSN:2249-2593, www.ijcotjournal.org. Published by Seventh Sense Research Group.

AbstractCloud computing is a distribute network for storing and sharing information over internet with scalability. Information security is one the major issue faced by cloud users and service providers. Data retrieval and security are major issues which block clients to adopt clud computing. Also, cloud servers enables the clients to store information on remote servers thereby preventing third party attacks over this data. The main objective of our research work is to store,transmit and extract data in a secure channel.In this proposed model,secured data transmission model using data integrity approach was implemented. Experimental results proved that the proposed integrity model has high accuracy compared to traditional data transmission models.

References-

[1] G. Czajkowski and L. Dayn´es. Multitasking without compromise: a virtual machine evolution. ACM SIGPLAN Notices, 36(11):125.138, Nov. 2001. Proceedings of the 2001 ACM SIGPLAN Conference on Object Oriented Programming, Systems, Languages and Applications (OOPSLA 2001).
[2] S. Devine, E. Bugnion, and M. Rosenblum. Virtualization system including a virtual machine monitor for a computer with a segmented architecture. US Patent, 6397242, Oct. 1998.
[3] CHEN, Y., DAS, A., QIN, W., SIVASUBRAMANIAM, A., WANG, Q., AND GAUTAM, N. Managing server energy and operational costs in hosting centers. In In Proceedings of the International Conference onMeasurement and Modeling of Computer Systems (2005).
[4] DOYLE, R., CHASE, J., ASAD, O., JIN, W., AND VAHDAT, A. Model- Based Resource Provisioning in aWeb Service Utility. In In Proceedings of the 4th USENIX Symposium on Internet Technologies and Systems (2003).
[5] ELNOZAHY, M., KISTLER, M., AND RAJAMONY, R. Energy conservation policies for web servers. In USITS (2003). [6] D. Reed, I. Pratt, P. Menage, S. Early, and N. Stratford. Xenoservers: accounted execution of untrusted code. In Proceedings of the 7th Workshop on Hot Topics in Operating Systems, 1999.
[7] J. S. Robin and C. E. Irvine. Analysis of the Intel Pentium's ability to support a secure virtual machine monitor. In Proceedings of the 9th USENIX Security Symposium, Denver, CO, USA, pages 129.144, Aug. 2000.
[8]LiteGreen: Saving Energy in Networked Desktops Using Virtualization ,Tathagata Das.

Keywords-
cloud server, data integrity, secure transmission.