Papers by Dr. V. Krishna Reddy

Journal of Computer Science, 2018
Hosts in distributed cloud environment configured with Local Resource Monitors (LRM) that runs au... more Hosts in distributed cloud environment configured with Local Resource Monitors (LRM) that runs autonomously, monitors underlying host's resource usage and balances underlying host's resource usage by migrating Virtual Machine (VM) to other hosts. LRM takes decision for VM migration at fixed interval considering own current CPU usage and the other hosts CPU usage. The peer hosts unawares about the decision taken by the other hosts LRM about VS migration. As a result of this, there are chances that the same host selection from multiple hosts during the VS placement. This results into destination host to over utilized or the LRM at destination host initiates the VS migration. Several approaches have been proposed for decentralized VS placement that includes two threshold based VS placement, hypercube based VM placement, Ant Colony based VS placement. These approaches does not considers future behavior of the destination hosts after VS placement. This paper discusses the decentralized peer to peer Virtual Server Placement Approach (DPPVP) that considers host's current as well future CPU utilization for VS placement. The results shows that the proposed system avoids the over utilization of the destination host and host identification by the multiple hosts during VS placement.

Cornell University - arXiv, Jul 4, 2012
Nowadays most of the cloud applications process large amount of data to provide the desired resul... more Nowadays most of the cloud applications process large amount of data to provide the desired results. Data volumes to be processed by cloud applications are growing much faster than computing power. This growth demands new strategies for processing and analyzing information. Dealing with large data volumes requires two things: 1) Inexpensive, reliable storage 2) New tools for analyzing unstructured and structured data. Hadoop is a powerful open source software platform that addresses both of these problems. The current Hadoop implementation assumes that computing nodes in a cluster are homogeneous in nature. Hadoop lacks performance in heterogeneous clusters where the nodes have different computing capacity. In this paper we address the issues that affect the performance of hadoop in heterogeneous clusters and also provided some guidelines on how to overcome these bottlenecks.

Journal of Information Processing Systems, 2017
In the centralized cloud controlled environment, the decision-making and monitoring play crucial ... more In the centralized cloud controlled environment, the decision-making and monitoring play crucial role where in the host controller (HC) manages the resources across hosts in data center (DC). HC does virtual machine (VM) and physical hosts management. The VM management includes VM creation, monitoring, and migration. If HC down,the services hosted by various hosts in DC can't be accessed outside the DC. Decentralized VM management avoids centralized failure by considering one of the hosts from DC as HC that helps in maintaining DC in running state. Each host in DC has many VM's with the threshold limit beyond which it can't provide service.To maintain threshold , the host's in DC does VM migration across various hosts. The data in migration is in the form of plaintext, the intruder can analyze packet movement and can control hosts traffic. The incorporation of security mechanism on hosts in DC helps protecting data in migration. This paper discusses an approach for dynamic HC selection, VM selection and secure VM migration over cloud environment.

Social Network is a network where a set of individuals, groups or organizations interact and co... more Social Network is a network where a set of individuals, groups or organizations interact and communicate, explore the social relationships and diagrammatically represented as a Graph. Social Networking Service is the service where people can share data resources and communicate in bidirectional with web multimedia. In this paper we discussed metrics in
social networking such as clustering coefficient, cohesion, reach and rediality.
Social network graph theory is related to link analysis, structural analysis and centrality measures; we also concentrated on Numerical formulations and
simulations using datasets which are used for analysis of social network.Risks, Threats and vulnerabilities on social network areinterrelated to social engineering and part of Advanced Persistent Threat. Security approaches and
defense methods are discussed, developed and roved.Mathematical and Statistical theorems are developed with respect to the Algorithmic approach for social networks security in social cloud platform. Social Patterns are the
components and pieces of interactivity that are the building blocks of social experiences. We focused on the electronic connections and social tools that are changing the way that we interact with one another, which are designed and simplified to expand online experiences in social networks. We did considerations as practical approach where we applied statistical tools on network data and data analysis is given. Security is the principle concern; the main objective is to protect the social cloud from advanced risks, threats and
attacks.
Uploads
Papers by Dr. V. Krishna Reddy
social networking such as clustering coefficient, cohesion, reach and rediality.
Social network graph theory is related to link analysis, structural analysis and centrality measures; we also concentrated on Numerical formulations and
simulations using datasets which are used for analysis of social network.Risks, Threats and vulnerabilities on social network areinterrelated to social engineering and part of Advanced Persistent Threat. Security approaches and
defense methods are discussed, developed and roved.Mathematical and Statistical theorems are developed with respect to the Algorithmic approach for social networks security in social cloud platform. Social Patterns are the
components and pieces of interactivity that are the building blocks of social experiences. We focused on the electronic connections and social tools that are changing the way that we interact with one another, which are designed and simplified to expand online experiences in social networks. We did considerations as practical approach where we applied statistical tools on network data and data analysis is given. Security is the principle concern; the main objective is to protect the social cloud from advanced risks, threats and
attacks.
social networking such as clustering coefficient, cohesion, reach and rediality.
Social network graph theory is related to link analysis, structural analysis and centrality measures; we also concentrated on Numerical formulations and
simulations using datasets which are used for analysis of social network.Risks, Threats and vulnerabilities on social network areinterrelated to social engineering and part of Advanced Persistent Threat. Security approaches and
defense methods are discussed, developed and roved.Mathematical and Statistical theorems are developed with respect to the Algorithmic approach for social networks security in social cloud platform. Social Patterns are the
components and pieces of interactivity that are the building blocks of social experiences. We focused on the electronic connections and social tools that are changing the way that we interact with one another, which are designed and simplified to expand online experiences in social networks. We did considerations as practical approach where we applied statistical tools on network data and data analysis is given. Security is the principle concern; the main objective is to protect the social cloud from advanced risks, threats and
attacks.