Papers by kiran dcse Gndu

Advances in Intelligent Systems and Computing, 2017
Over the past few years, cloud computing has become a popular paradigm that provides computing ov... more Over the past few years, cloud computing has become a popular paradigm that provides computing over the internet. There are umpteen factors that a cloud ecosystem need such as reliability, flexibility, dynamic load balancing etc. With the internet facility, resources are provided dynamically to the end users in an on-demand fashion. Users could be billions in number accessing the cloud. Their need for services have been increasing at an alarming rate. To enhance the performance of the system, resources should be used efficiently. Cloud computing needs to identify different issues and challenges. One of the main issues in cloud computing is Load balancing, in which workload is distributed dynamically to all the nodes. Load balancing not only optimize the resource use, maximize throughput, minimize processing time of datacenters and response time of user base, but also helps in evading the overloading of any single resource. This paper proposes an Adaptive firefly algorithm (ADF) for solving the load balancing problem in cloud computing by performing virtual machine scheduling over datacenters. The results have been compared with Ant Colony Optimization (ACO) algorithm used for load balancing.

2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), 2016
Internet of Things (IoT) advances when regular ordinary objects have inter-connected microchips i... more Internet of Things (IoT) advances when regular ordinary objects have inter-connected microchips inside them. These microchips help stay informed concerning other objects, as well as a significant number of these devices sense their surroundings and report it to different machines and also to the people, so is the application of home environment. The viable significance of the IoT is made conceivable through enabling technologies, for example, Wireless Sensor Networks (WSNs), essentially utilized for detecting operations. In any case, there is a principle prerequisite that makes a wireless sensing perfect for use in the IoT, which is the energy efficiency. Much of the time, the sensing devices are battery-powered, so low-power system is prime requirement. Several mechanisms can be adopted in order to reduce the power consumption while designing the devices that implement a wireless protocol. This paper has presented a comparative study of various energy efficient IoT techniques.

2016 International Conference on Next Generation Intelligent Systems (ICNGIS), 2016
The advancements in the world of mobile technology have enabled computational intensive applicati... more The advancements in the world of mobile technology have enabled computational intensive applications on the latest smart phones. Still Smart Mobile Devices (SMD's) have low potential and are unable to run complex applications due to their limited battery life, storage capacity, processor speed and energy. These limitations of smart phones can be addressed through Mobile Cloud Computing (MCC) which allows the computational intensive applications from smart phones to get offloaded over the cloud environment. In this paper, computation offloading scheme has been proposed that distributes the workload among various Virtual Machines (VM's) on the basis of their distance from the current VM. The offloading will decrease the load on the current VM and increase the performance and speed of execution. The Buffer Allocation Method (BAM) is proposed which will further enhance the performance by eliminating the redundancy of the data to be transmitted during offloading. The results indicate that the speed of execution increases, energy consumption decreases and the load gets balanced due to offloading.

Cloud computing is a model which provides on-demand delivery of Information Technology (IT) relat... more Cloud computing is a model which provides on-demand delivery of Information Technology (IT) related capabilities or resources through the Internet to the outside world. Despite the advantages of cloud computing, the security of the data and resources is still doubtful which affect the cloud adoption. The raising amount of personal and confidential data brings up attention on storing the data securely. Data can be composed of financial transactions, vital documents, and multimedia contents. Implementation of cloud computing services may minimize local storage trust in addition decrease operational and maintenance costs. However, the users still have major privacy and security concerns about their data stored on remote servers due to potential unauthorized access among the service providers. So, these concerns bring focus on security issues related to cloud computing which is the reason why most of the industries still not adopting cloud server for the storage of their critical data. Cloud computing does not provide transparency to users to view where their data is being stored and users have to trust the service provider for handling and maintaining their data. Also, it does not provide users to access the audit logs because many users are sharing the same cloud server so audit activity of one tenant might constitute a transparency for another tenant. In this paper, the extreme focus is given to the security challenges related with cloud's service models, deployment models, and issues related to networking capabilities are discussed and studied. In addition, the existing symmetric and asymmetric encryption algorithms utilized to render security in cloud computing environment are reviewed. Furthermore, the comparative analysis of different encryption algorithms based upon few parameters is also been performed.
2016 International Conference on Next Generation Intelligent Systems (ICNGIS), 2016
Multi-core systems are built on a number of processors and have their own memories. Multi-core pr... more Multi-core systems are built on a number of processors and have their own memories. Multi-core processing is like parallel processing because it makes a number of tasks to run at the same time and it enhances the energy efficiency and performance of jobs. The review has shown that if fuzzy rules are combined with multi core computing then power consumption of multi core processors can be further balanced and performance of multi cores can be further increased. Therefore this work has proposed a fuzzy based map reduce technique for multi-core systems. The use of triangular membership function has reduced the potential overheads of Map-reduce technique. Thus proposed technique has quite significant improvement over available techniques.

Proceedings of the International Conference on Advances in Information Communication Technology & Computing - AICTC '16, 2016
The computational work load has been diverted from humans to machines as it has reached to a limi... more The computational work load has been diverted from humans to machines as it has reached to a limit that cannot be handled by humans. Same is the case with the machines. Nowadays cloud is used very commonly which makes the load on the cloud system increase day by day. The cloud uses data centers and with the increase in number of users the load on data centers is increasing. In that case, if the data center goes down then all the data stored on the VMs(Virtual Machine) of that data centre will be lost. In existing system distance based load consideration is absence where as proposed system is based upon it. This paper proposes a technique for offloading the data of a VM to multiple data centers. In the proposed technique, migration will be performed by the use of live VM migration which means that the migration does not required to switch off the devices which is the case in offline migration.

International Journal of Wireless and Microwave Technologies, 2016
WSNs are becoming popular in real world uses. Due to resource-constrained and battery-aware featu... more WSNs are becoming popular in real world uses. Due to resource-constrained and battery-aware features of the sensor; WSNs energy use in a major research topic was found to be interesting. WSNs contain battery powered nodes that for certain action or tasks are connected with the base station. The lifetime of battery-powered sensor nodes, after the consumption of the battery will be dead in WSNs. To prolong the lifetime of WSNs the energy has to be well organized. The cluster head selection and assignment, and construction of clusters require additional overhead. Cluster nodes distributed algorithms designed incorrectly can lead to isolation from cluster heads. Such isolated nodes waste large amount of energy to communicate with the sink. In this paper, energy conservation techniques related to WSNs are discussed. Also, the existing energy conservation algorithms are reviewed and the comparative analysis is also performed.

ACM Computing Surveys, 2018
Inter-connected cloud computing is an inherent evolution of Cloud Computing. Numerous benefits pr... more Inter-connected cloud computing is an inherent evolution of Cloud Computing. Numerous benefits provided by connecting clouds have garnered attraction from the academic as well as the industry sector. Just as every new evolution faces challenges, inter-connected clouds have their own set of challenges such as security, monitoring, authorization and identity management, vendor lock-in, and so forth. This article considers the vendor lock-in problem, which is a direct consequence of the lack of interoperability and portability. An extensive literature review by surveying more than 120 papers has been done to analyze and categorize various solutions suggested in literature for solving the interoperability and portability issues of inter-connected clouds. After categorizing the solutions, the literature has been mapped to a specific solution and a comparative analysis of the papers under the same solution has been done. The term “inter-connected clouds” has been used generically in this ...

The computational work load has been diverted from humans to machines as it has reached to a limi... more The computational work load has been diverted from humans to machines as it has reached to a limit that cannot be handled by humans. Same is the case with the machines. Nowadays cloud is used very commonly which makes the load on the cloud system increase day by day. The cloud uses data centers and with the increase in number of users the load on data centers is increasing. In that case, if the data center goes down then all the data stored on the VMs(Virtual Machine) of that data centre will be lost. In existing system distance based load consideration is absence where as proposed system is based upon it. This paper proposes a technique for offloading the data of a VM to multiple data centers. In the proposed technique, migration will be performed by the use of live VM migration which means that the migration does not required to switch off the devices which is the case in offline migration.

— The advancements in the world of mobile technology have enabled computational intensive applica... more — The advancements in the world of mobile technology have enabled computational intensive applications on the latest smart phones. Still Smart Mobile Devices (SMD's) have low potential and are unable to run complex applications due to their limited battery life, storage capacity, processor speed and energy. These limitations of smart phones can be addressed through Mobile Cloud Computing (MCC) which allows the computational intensive applications from smart phones to get offloaded over the cloud environment. In this paper, computation offloading scheme has been proposed that distributes the workload among various Virtual Machines (VM's) on the basis of their distance from the current VM. The offloading will decrease the load on the current VM and increase the performance and speed of execution. The Buffer Allocation Method (BAM) is proposed which will further enhance the performance by eliminating the redundancy of the data to be transmitted during offloading. The results indicate that the speed of execution increases, energy consumption decreases and the load gets balanced due to offloading.
— Multi-core systems are built on a number of processors and have their own memories. Multi-core ... more — Multi-core systems are built on a number of processors and have their own memories. Multi-core processing is like parallel processing because it makes a number of tasks to run at the same time and it enhances the energy efficiency and performance of jobs. The review has shown that if fuzzy rules are combined with multi core computing then power consumption of multi core processors can be further balanced and performance of multi cores can be further increased. Therefore this work has proposed a fuzzy based map reduce technique for multi-core systems. The use of triangular membership function has reduced the potential overheads of Map-reduce technique. Thus proposed technique has quite significant improvement over available techniques.

WSNs are becoming popular in real world uses. Due to resource-constrained and battery-aware featu... more WSNs are becoming popular in real world uses. Due to resource-constrained and battery-aware features of the sensor; WSNs energy use in a major research topic was found to be interesting. WSNs contain battery powered nodes that for certain action or tasks are connected with the base station. The lifetime of battery-powered sensor nodes, after the consumption of the battery will be dead in WSNs. To prolong the lifetime of WSNs the energy has to be well organized. The cluster head selection and assignment, and construction of clusters require additional overhead. Cluster nodes distributed algorithms designed incorrectly can lead to isolation from cluster heads. Such isolated nodes waste large amount of energy to communicate with the sink. In this paper, energy conservation techniques related to WSNs are discussed. Also, the existing energy conservation algorithms are reviewed and the comparative analysis is also performed.

— Internet of Things (IoT) advances when regular ordinary objects have interconnected microchips ... more — Internet of Things (IoT) advances when regular ordinary objects have interconnected microchips inside them. These microchips help stay informed concerning other objects, as well as a significant number of these devices sense their surroundings and report it to different machines and also to the people, so is the application of home environment. The viable significance of the IoT is made conceivable through enabling technologies, for example, Wireless Sensor Networks (WSNs), essentially utilized for detecting operations. In any case, there is a principle prerequisite that makes a wireless sensing perfect for use in the IoT, which is the energy efficiency. Much of the time, the sensing devices are battery-powered, so low-power system is prime requirement. Several mechanisms can be adopted in order to reduce the power consumption while designing the devices that implement a wireless protocol. This paper has presented a comparative study of various energy efficient IoT techniques. Keywords—internet of things; energy efficiency; fuzzy logic controller; bluetooth low energy; wireless sensors

Over the past few years, cloud computing has become a popular paradigm that provides computing ov... more Over the past few years, cloud computing has become a popular paradigm that provides computing over the internet. There are umpteen factors that a cloud ecosystem need such as reliability, flexibility, dynamic load balancing etc. With the internet facility, resources are provided dynamically to the end users in an on-demand fashion. Users could be billions in number accessing the cloud. Their need for services have been increasing at an alarming rate. To enhance the performance of the system, resources should be used efficiently. Cloud computing needs to identify different issues and challenges. One of the main issues in cloud computing is Load balancing, in which workload is distributed dynamically to all the nodes. Load balancing not only optimize the resource use, maximize throughput, minimize processing time of datacenters and response time of user base, but also helps in evading the overloading of any single resource. This paper proposes an Adaptive firefly algorithm (ADF) for solving the load balancing problem in cloud computing by performing virtual machine scheduling over datacenters. The results have been compared with Ant Colony Optimization (ACO) algorithm used for load balancing.

Interconnected cloud computing is an inherent evolution of Cloud Computing. Numerous benefits pro... more Interconnected cloud computing is an inherent evolution of Cloud Computing. Numerous benefits provided by connecting clouds have garnered attraction from the academic as well as the industry sector. Just as every new evolution faces challenges, interconnected clouds have their own set of challenges such as security, monitoring, authorization and identity management, vendor lock-in, and so forth. This article considers the vendor lock-in problem, which is a direct consequence of the lack of interoperability and portability. An extensive literature review by surveying more than 120 papers has been done to analyze and categorize various solutions suggested in literature for solving the interoperability and portability issues of interconnected clouds. After categorizing the solutions, the literature has been mapped to a specific solution and a comparative analysis of the papers under the same solution has been done. The term " interconnected clouds " has been used generically in this article to refer to any collaboration of clouds which may be from the user side (Multi-clouds or Aggregated service by Broker) or the provider side (Federated clouds or Hybrid clouds). Lastly, two closely related issues (Brokers and Meta-scheduling) and the remaining challenges of interconnected clouds are discussed.

— Load balancing is usually a technique used for enhancing the performance of a parallel as well ... more — Load balancing is usually a technique used for enhancing the performance of a parallel as well as distributed system. The performance from the systems might be enhanced by means of redistribution regarding load over the different cell phone networks. As a result, load balancing plays a significant role pertaining to increasing your efficiency regarding distributed program, but this is a very challenging and difficult task inside large scale distributed system as the global condition of spread systems is usually changes dynamically. Regarding various factors like greatest throughput, outage possibility, availability along with scalability your distributed program needs productive load evening out. In this paper various load balancing techniques have been studied and out of these dynamic load balancing techniques are seem to be good for load balancing. Also, the present load balancing algorithms are reviewed along with the comparative analysis is usually performed. Keywords— Load Balancing, Cell Networks, Fuzzy Logic, fuzzy based dynamic load balancing algorithm
Page 339 associated with cloud. Encryption is the foremost option for securing the data and this ... more Page 339 associated with cloud. Encryption is the foremost option for securing the data and this paper highlights comparative analysis of symmetric as well as asymmetric encryption algorithms for providing security in cloud computing systems.

Cloud computing is a model which provides on-demand delivery of Information Technology (IT) relat... more Cloud computing is a model which provides on-demand delivery of Information Technology (IT) related capabilities or resources through the Internet to the outside world. Despite the advantages of cloud computing, the security of the data and resources is still doubtful which affect the cloud adoption. The raising amount of personal and confidential data brings up attention on storing the data securely. Data can be composed of financial transactions, vital documents, and multimedia contents. Implementation of cloud computing services may minimize local storage trust in addition decrease operational and maintenance costs. However, the users still have major privacy and security concerns about their data stored on remote servers due to potential unauthorized access among the service providers. So, these concerns bring focus on security issues related to cloud computing which is the reason why most of the industries still not adopting cloud server for the storage of their critical data. Cloud computing does not provide transparency to users to view where their data is being stored and users have to trust the service provider for handling and maintaining their data. Also, it does not provide users to access the audit logs because many users are sharing the same cloud server so audit activity of one tenant might constitute a transparency for another tenant. In this paper, the extreme focus is given to the security challenges related with cloud’s service models, deployment models, and issues related to networking capabilities are discussed and studied. In addition, the existing symmetric and asymmetric encryption algorithms utilized to render security in cloud computing environment are reviewed. Furthermore, the comparative analysis of different encryption algorithms based upon few parameters is also been performed.
Uploads
Papers by kiran dcse Gndu