i-manager's Journal on Cloud Computing (JCC)


Volume 4 Issue 1 January - June 2017

Article

An Analysis of Energy Efficiency and Traffic Using Cloud Computing in Portable Devices

Praful Saxena* , Sandeep Kumar Sharma**, Neeraj Kumar Verma***
*-** Senior Faculty, iNurture Education Solutions Pvt Ltd, Bengaluru, India.
*** Assistant Professor, Teerthankar Mahaveer University, Moradabad, India.
Saxena. P., Sharma. S. K., and Verma. N. K (2017). An Analysis of Energy Efficiency and Traffic Using Cloud Computing in Portable Devices. i-manager's Journal on Cloud Computing, 4(1), 1-7. https://doi.org/10.26634/jcc.4.1.13752

Abstract

Cloud computing is the storing, processing and management of applications, data and programs using the Internet and not through the hard drive of a personal computer. With cloud computing, organisations can store large amount of data efficiently and access them with great ease. The pay-as-you-go cloud model allows enterprises, both big and small to enjoy enhanced cost savings and better agility. This paper will introduce you to the fundamental concepts of cloud computing.

Research Paper

Implementing Preserved Access of Cloud Networking

Kaki Leela Prasad* , Pilaka Anusha**
*-** Assistant Professor, Vignan's Institute of Information Technology, Visakhapatnam, India.
Prasad. K., and Anusha. P (2017). Implementing Preserved Access of Cloud Networking. i-manager's Journal on Cloud Computing, 4(1), 8-14. https://doi.org/10.26634/jcc.4.1.13753

Abstract

Cloud computing is an emerging technology for providing Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Security-as-a-Service (SaaS), which offers reduced capital expenditure, maintenance, complexity and we require a new security mechanism for distributed computing and server client computing. In this scenario, the authors have proposed a “Preserved access for cloud networking” that supports anonymous authentication for security issues. In this scheme, cloud performs some verification procedure to validate the authenticity of user and also has an added feature of access control in which only valid user can able to decrypt the stored data and also prevent replay attacks. Also they have addressed another important feature called user revocation when any user performs malicious operations on stored data.

Research Paper

HABCO: A Hybrid Algorithm to Improve Load Balancing in Cloud Computing

K. Tamilarasi* , V. Ramya**
** M.Phil Scholar, Department of Computer Science, Government Arts College for Men, Nandanam, Chennai. India
*** Assistant Professor, Department of Computer Science, Government Arts College for Men, Nandanam, Chennai, India.
Tamilarasi. K., and Ramya, V. (2017). HABCO: A Hybrid Algorithm to Improve Load Balancing In Cloud Computing. i-manager's Journal on Cloud Computing, 4(1), 15-22. https://doi.org/10.26634/jcc.4.1.13754

Abstract

Cloud Computing is known to be a well emerged architecture in recent times that tends to satisfy all the aspirations of entrepreneurs and researchers on a variety of fields. In the modern era we find large volume of data in different forms to be stored on cloud and multiple requests are triggered for resources, thus increasing load on servers sometimes unable to provide all the available resources on required time. This piece of research work designs a hybrid algorithm that is framed by combining the characteristics of two load balancing algorithms. Hybrid Ant Bee Colony optimization algorithm is a new phase in the field of load balancing on cloud computing that implements the characteristics real ants and bees. The searching of food source of an ant and searching of honey hive of bee resembles the searching of nodes in task scheduling. The algorithm designed implements the Ant colony optimization concept that corresponds updating pheromone table. Frequently updating the Pheromone table improves the performance of load balancing, the magnitude of pheromone deposited in the path of food source and also the fitness value calculation of the bees helps in identifying the best hive of bees. The works draw a different perspective by calculating the waiting time for a node to get allocated by a new task. It assures the improvement in performance of the system when HABCO is implemented as the node undergoes less waiting time.

Survey Paper

Cloud Manufacturing-A Boon for Manufacturing SMEs

Subramaniam Arunachalam* , 0**, Aloysius A. Edohis***
* Senior Lecturer, Mechanical Engineering Group, University of East London, UK.
** PhD Student, University of East London, UK.
*** Senior Lecturer, Department of Computer Science, School of Architecture, Computing & Engineering, University of East London, UK.
Arunachalam. S., Xavier. R. S. F. K., and Aloysius A. Edohis (2017). Cloud Manufacturing-A Boon for Manufacturing SMEs. i-manager's Journal on Cloud Computing, 4(1), 23-27. https://doi.org/10.26634/jcc.4.1.13755

Abstract

Automotive Manufacturing organizations constantly innovate to compete and sustain competitive advantage. In the past couple of decades, the manufacturing industry has been using management strategies and practices like Six Sigma, Lean Manufacturing, Total Quality Management, Agile Manufacturing, and Just-in-Time. However, in the recent times, cloud computing has begun to make waves in the manufacturing environment, to improve the efficiency of the manufacturing business processes. This paper discusses advantages of the new manufacturing model called 'Cloud Manufacturing' and analyses its benefits for the SMEs s to achieve reliable, economic manufacturing resources at lower cost, and thereby provide a fast, high quality, and low cost product manufacture.

Survey Paper

Checkpointing: Fault Tolerance Mechanism

Neeraj Kumar Rathore*
Assistant Professor, Department of Computer Science & Engineering, Jaypee University of Engineering & Technology, Guna, M.P., India.
Rathore. N (2017). Checkpointing: Fault Tolerance Mechanism. i-manager's Journal on Cloud Computing, 4(1), 28-34. https://doi.org/10.26634/jcc.4.1.13756

Abstract

Checkpointing is a technique for inserting fault tolerance into computing systems. It basically consists on storing a snapshot of the current application state, and uses it for restarting the execution in case of failure. It is saving the program state, usually to stable storage, so that it may be reconstructed later in time. Checkpointing provides the backbone for rollback recovery (fault-tolerance), playback debugging, process migration, and job swapping. It mainly focuses on fault-tolerance, process migration, and the performance of checkpointing on all computational platforms from uniprocessors to supercomputers.

Checkpointing and restart has been one of the most widely used techniques for fault tolerance in large parallel applications. By periodically saving application status to permanent storage (disk or tape), the execution can be restarted from the last checkpoint if system faults occur. It is an effective approach to tolerating both hardware and software faults. For example, a user who is writing a long program at a terminal can save the input buffer occasionally to minimize the rewriting caused by failures that affect the buffer.