Computer Science And Technology - Master Dissertation
Permanent URI for this collection
Browse
Browsing Computer Science And Technology - Master Dissertation by Subject "Cloud Computing"
Now showing 1 - 3 of 3
Results Per Page
Sort Options
Item A fault tolerable load balancing technique in cloud computing(Central University of Punjab, 2014) Shiny; Khurana, Surinder.KAs the IT industry is growing day by day, the need of computing and data storage is increasing rapidly. The process of this increasing mass of data requires more computer equipment to meet the various needs of the organizations. To better capitalize their investment, the over-equipped organizations open their infrastructures to others by exploiting the Internet and other important technologies such as virtualization by creating a new computing model: the cloud computing. Cloud computing is one of the significant milestones in recent times in the history of computers. However, there are number of technical challenges that need to be tackled which include reliability, resource provisioning, fault tolerance, load balancing and efficient mechanism to increase the service level agreement (SLA) and better use of the resources. The main purpose of this dissertation report is to provide a preface of the topic and to work on the various issues involved in the field of load balancing and fault tolerance i.e. load computation and the distribution of load. Load balancing and fault tolerance in cloud computing have a great impact on the performance of the system. Good load balancing makes cloud computing more efficient by provisioning of resources to cloud users on demand basis in pay-as-you-say manner. Load balancers are used for assigning load to different virtual machines in such a way that none of the nodes gets loaded heavily or lightly. When many clients request the server simultaneously, server is overloaded which causes fault. There are many load balancing algorithms and fault tolerance techniques in order to settle down these issues, but these techniques further had some drawbacks. Das and Khilar (2013) discussed a load balancing technique for virtualization and fault tolerance in cloud computing (LBVFT) to assign the task to the virtual nodes depending upon the success rates (SR) and the previous load history. This v technique tolerates not only the faults but also reduce the chance of future faults by not assigning tasks to virtual nodes of physical servers whose success rates are very low and loads are very high. But there is still a need to provide an efficient load balancing, load migration, load calculation and fault handling technique to make the VFT model more effective.Item Securing virtualization to mitigate TCP-DDOS between multiple tenants on the same physical host in cloud computing(Central University of Punjab, 2014) Kanika; Sidhu, NavjootCloud computing is the fastest growing technology in the IT world. The technology offers reduced IT costs and provides on the demand services to the individual users as well as organizations over the Internet. The means of cloud computing is obtained by the virtualization of the resources such as hardware, platform, operating system and storage devices. Virtualization permits multiple operating systems to run on the same physical machine. Multiple tenants are unaware of the presence of the other tenant with whom they are sharing the resources. The co-existence of multiple virtual machines can be exploited to gain the access over other tenant's data or attack to deny of services. The significant concern is insuring the security and providing isolation between multiple operating systems. Denial-of-Service (DoS) attack poses a serious network security challenge to the virtualized cloud computing. All the virtual machines and the host machine shares common resources over the cloud computing. A malicious virtual machine can exhaust the common resources by flooding the co- existing VM with high rate of unreasonable network traffic. The threat of DoS attack becomes even more severe with DDoS (Distributed Denial-of-Service) attack. Other virtual machines are compromised on the virtualized cloud to perform DDoS attack. The dissertation aims to provide an analysis of the different attacks raised by the multi-tenancy and the virtualization in an IaaS cloud. The research focuses on the threats arises from malicious tenants to the co-existing tenants on the same physical host. As part of the aim of this research, the terms of cloud computing, multi-tenancy and virtualization are analysed. The vulnerability of the DDoS attack by a malicious virtual machine over co-existing virtual machine in the private cloud infrastructure is explored along with a mechanism on how to approach it. The research approaches to provide a security model to mitigate the effect of denial of service attack from the virtualized cloud computing.Item Service level agreement aware energy efficient approach for virtual machine placement in clous data center(Central University of Punjab, 2014) Kaur, Nirmaljeet; Khurana, Surinder.KGenerally, the growth of computing systems has been concentrate on performance improvement or fast processing of applications from the view point of customer, scientific and business perspective. However, this type of computing increases energy consumption. It is continue to consume large amount of energy in the form of electrical power. In cloud computing data center hosting of cloud applications consume huge amount of energy. Optimization of the energy requirements of data center is a very challenging task. This dissertation report describes the energy efficiency of minimization of migration policy in IaaS environment. In this policy VM migration, energy consumption, SLA violations are calculated. VM migration directly influences resource utilization and Quality of Service (QoS) parameters provided by the system. The effect of disturbance cause server overloads, resource shortage, performance degradation etc. So, one of the challenging task is, the placement of VMs, like where, when, which VM could be migrated for saving energy and less SLA violations, with minimum number of migration. In this research work a new approach has been proposed to select VMs to migrate from the over utilized host. Approach migrates those VMs that belongs to the higher category so that that the resources allocated to these VMs have less cost penalties for SLA violations. Proposed approach results are compared to the simulated Minimization of Migration Policy (Beloglazov et al., 2012) and compared its energy requirements, virtual machine migration and SLA violation with Minimum Migration Time and Random Selection policies.