A Study On Methods To Improve Efficiency of Cloud Computing
||International Journal of Computer & Organization Trends (IJCOT)||
|© 2020 by IJCOT Journal|
|Volume - 10 Issue - 2
|Year of Publication : 2020|
|Authors : : Muzammil H Mohammed, Faiz Baothman|
|DOI : 10.14445/22492593/IJCOT-V10I2P303|
MLA Style:Muzammil H Mohammed, Faiz Baothman "A Study On Methods To Improve Efficiency of Cloud Computing" International Journal of Computer and Organization Trends 10.2 (2020): 13-17.
APA Style:Muzammil H Mohammed, Faiz Baothman(2020). A Study On Methods To Improve Efficiency of Cloud Computing. International Journal of Computer and Organization Trends, 10(2), 13-17.
Cloud computing encourages amazingly versatile administrations that can be devoured over the web. A significant part of the cloud administrations is that the client information are put away remotely in obscure machines in which clients don`t groups or oversee. Information security and respectability is a significant research region amid the most recent couple of years. Cloud computing gives virtual condition that permits cloud clients to get to the assets of the cloud in a helpful and on demand way. Since the information are put away remotely, we need to remember that delicate cloud information must be encoded before they are redistributed to the business open cloud, which makes effective information usage administration. The initial segment of the work introduced in this proposition is top n document recovery utilizing bunch based positioning strategy. Accessible encryption record recovery strategy enables clients to safely look over scrambled information through inquiry word. Positioning the records dependent on importance scores extraordinarily upgrades framework ease of use by making it conceivable pertinence positioning as opposed to sending undesirable outcomes and further guarantees the document recovery precision. In this study, we are building up a computerized framework for both named and anonymous records dependent on the grouping calculations. We actualize the positioning and looking calculation to recover top n documents. The subsequent plan can give effective positioning which will decrease the pursuit time radically and lessen the correspondence overhead. The mapping and encryption calculations ensure record against an outside assailant and forestall an untrusted cloud information supplier from learning information.
 Anderson, A. V., Benett, S. M., Kagi, A., Leung, F.H., Martins, F. C. M., Neiger, G., Rodgers, D., Santoni, A.L., Smith, L., Uhlig, R., (2005). “Intel Virtualization Technology”. IEEE Computer, Vol. 38 (5) pp. 48-56, 2005.
 Dongarra, J.J., Fox, G. C., Hwang, K., “Distributed and Cloud Computing: From Parallel Processing to Internet of Things”. Morgan Kauffmann Publishers, 2012.
 Abels, T., Dhawan, P., “An Overview of Xen Virtualization”. Dell Power Solutions, 2005.
 Cuadrado. F., Duenas, C.J., “System Virtualization Tools”, IEEE Internet Computing, Vol.13 (5), pp. 52-59, 2009.
 Dragovic, B., Fraser,D., Hand, S., Harris, T., Ho, A., Neugebauer, R., Paul, B., Pratt, I., Warfield, A., “Xen and The Art of Virtualization”. Proceedings of the 19th ACM Symposium on Operating Systems Primciples. pp. 164-177, 2003.
 Liu, Z., Qu, W., Liu, W., Xen, K. L., “Live Migration with Slowdown Scheduling Algorithm”, International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT), pp. 215-221, 2010.
 Linux Foundation (April 2014), “Dom0 Kernels for Xen” (Online), 2014.
 Broberg, J., Buyya, R, “Cost of Virtual Machine Live Migration”, Grid Computing and Distributed Sytems Meet. UNSW, 2009.
 Liu, Z., Qu, W., Liu, W., Xen, K. L., “Live Migration with Slowdown Scheduling Algorithm”. International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT) pp. 215-221, 2010.
 Azzedin, F., Maheswaran, M., “Toward trust-aware resource management in grid computing systems”, In cluste computing and the grid , pp. 452, 2002.
 Ali M. A., “A Guide to Dynamic Load Balancing in Distributed Computer Systems”, IJCSNS International Journal of Computer Science and Network Security,VOL.10 No.6, June 2010.
Cloud computing, virtual environment, efficiency.