ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Resource Allocation and Data Provisioning for Data Centers In Cloud

Journal: International Journal for Scientific Research and Development | IJSRD (Vol.3, No. 11)

Publication Date:

Authors : ; ;

Page : 845-848

Keywords : Cloud computing; secure data storage and transfer; IaaS (Infrastructure as a Service); Quantum cryptography;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The storage server based companies are getting increased like GO DADDY, BIG ROCK, NET4, SPEEDHOST and etc. Each server need to maintain their own storage server, it may leads to server overload. Due to this problem here we are introducing an intelligent scheme for dynamic resource allocation. The resource which is provided by infrastructure as a service (IaaS). The reason for using Infrastructure as a service is, this layer deals all types of storage and storage limitations which can be internally programmed. This method will be working under data provisioning methods. Each and every cloud servers will be internally connected under the security rules. The main advantage is, in case a sever space getting increased or got full means, the hand shaking method will automatically allot space in the next allocated server. A log file will be maintained for this resource allocation. In case of the current server will be getting some free space means, the allocated data will be transfers to the original source server. This process will not take much time duration; it will be done in a nano second. For this process the current server will be pay for another server. This process will be executed till last storage will be getting allocated. Here the policies are not over rules like stealing of data and security issues. This is because during the time of data re-allocation all the data and details will be encrypted dual times. During the time of retrieval the data will be again decrypted. This method was done using Quantum Cryptography. Without violating the policies this resource allocation can be done perfectly.

Last modified: 2016-02-12 18:43:00