Cloud Computing is the rising field of newest computing in this day and age. The cloud computing is based on the five essential characteristics and its three prime services (Software as a Service, Platform as a Service, Infrastructure as a Service). The major goal of cloud computing is to provide the resources as a services to the cloud consumers or clients. The new concept of Federated Cloud Computing in which multiple datacenters are distributed over different geographical regions. Since the evolution of Cloud Computing: Load balancing and management, energy efficient management, Virtual Machine(VM) migration, service brokerage policies, cost modeling, security issues and trust management are popular research topics in the field. The process of deployment of real cloud environment for testing or for commercial use is extremely costly. Cloud simulators help to model various cloud applications and it is very easy to analyze. In this survey, we used the CloudAnalyst, GUI Java based simulator with their overview are presented so it can be easily decided which one is suitable for particular research topic. And also the survey on the service broker policy, its issues and available solutions are presented. In this thesis we focused on performance evaluation of large data centers using some parameters like cost, service broker policies, User base, Number of physical machines in data centers, Data centers processing time, load balancing policies. Because there is always been the requirement to select appropriate datacenter so that further tasks for processing the request should be carried out with efficiency in least response time. So the issue of selecting appropriate datacenter which is known as service broker policy is kind of important. We also demonstrate the trust as factor majorly used between the cloud service provider and cloud consumers.
The goal of this study is to be investigate the use of Artificial Neural Networks (ANNs) in several kinds of digital circuits as well as in the field of Cryptography. Cryptography utilizes mathematical techniques for information security. Information security is presently a compulsory component of commercial applications, military communications and also social media implementation. It maintains the privacy that is the core of information security. Any cryptography needs confidentiality, authentication, integrity and non-repudiation from those authorized to have it. Authentication relates to the identification of two parties entering into communication, while integrity addresses the unauthorized variation of an element inserted into the system. Interacting neural networks have been figured diagnostically. At training step two networks receive a common random input vector and learn their mutual output bits. It could also be attractive for us to study the role of fuzzy based Advanced neural network, Genetic algorithms and Fuzzy neural network. The main goal for the use of fuzzy logic in ANN is to test whether fuzzy rule based approach has merits in dealings with the cyber security threats in the system.
Cloud computing is emerging technology which is a new standard of large scale distributed computing and parallel computing. It provides shared resources, information, software packages and other resources as per client requirements at specific time. As cloud computing is growing rapidly and more users are attracted towards utility computing, better and fast service needs to be provided. For better management of available good load balancing techniques are required. So that load balancing in cloud becoming more interested area of research. And through better load balancing in cloud, performance is increased and user gets better services.
CloudSim is an event-driven simulator implemented in Java. Because of its object-oriented programming feature, CloudSim allows extensions and definition of policies in all the components of the software stack, thereby making it a suitable research tool that can mimic the complexities arising from the environments.
Cloud provides data centers distributed across geographical channels. Each DC consists of hundreds of servers called VMs. When a user submits a task, that are collected to a cloudlet. These tasks are handled by the data center controller. The data center controller uses a VMloadbalancer to determine which VM should be assigned to the next request for processing. The VMloadbalancer uses various schemes to balance the load in complex cloud environment5
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License